c4b3rw0lf (@c4b3rw0lf) 's Twitter Profile
c4b3rw0lf

@c4b3rw0lf

Offensive Security - Red Team | Malware Analysis | Digital Forensics | RE

ID: 712320087336869888

linkhttps://github.com/c4b3rw0lf calendar_today22-03-2016 16:48:37

654 Tweet

66 Followers

197 Following

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Golden dMSA - This tool exploits a new attack against delegated Managed Service Accounts called the "Golden DMSA" attack. The technique allows attackers to generate passwords for all associated dMSAs offline. meterpreter.org/golden-dmsa-to…

Golden dMSA - This tool exploits a new attack against delegated Managed Service Accounts called the "Golden DMSA" attack. The technique allows attackers to generate passwords for all associated dMSAs offline.
meterpreter.org/golden-dmsa-to…
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

The flaw allows attackers to gain SYSTEM privileges on Windows Server 2025 via a new NTLM relay attack that bypasses LDAP Channel Binding. PoC available! #WindowsServer #InfoSec #CVE #NTLM #CyberSecurity securityonline.info/poc-exploit-re…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

EvilMist - a collection of scripts and utilities designed to support cloud penetration testing & red teaming. ✅Identify misconfigurations ✅Assess privilege-escalation paths ✅Simulate attack techniques github.com/Logisek/EvilMi…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

OffsetInspect - PowerShell utility to map AV detection offsets in PowerShell scripts to their corresponding line numbers for static analysis and red-team tooling github.com/warpedatom/Off…

Smukx.E (@5mukx) 's Twitter Profile Photo

Understanding Null Pointer Dereference in Windows Kernel Drivers TLDR; this blog post will explore one of the classic yet dangerous bugs null pointer dereference. whiteknightlabs.com/2025/06/24/und…

Understanding Null Pointer Dereference in Windows Kernel Drivers

TLDR; this blog post will explore one of the classic yet dangerous bugs null pointer dereference. 

whiteknightlabs.com/2025/06/24/und…
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Static analysis for Android apps based on the OWASP MASVS framework 🌟 - github.com/Cyber-Buddy/AP… #infosec #cybersec #bugbountytips

Static analysis for Android apps based on the OWASP MASVS framework 🌟 

- github.com/Cyber-Buddy/AP… 

#infosec #cybersec #bugbountytips
Swissky (@pentest_swissky) 's Twitter Profile Photo

Collection of BOFs created for red team/adversary engagements. Created to be small and interchangeable, for quick recon or eventing. github.com/atomiczsec/Adr…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Manipulating and obfuscating call stacks by klez Part 1: klezvirus.github.io/posts/Moonwalk… Part 2: klezvirus.github.io/posts/Callback… #infosec

Manipulating and obfuscating call stacks by <a href="/KlezVirus/">klez</a>

Part 1: klezvirus.github.io/posts/Moonwalk…
Part 2: klezvirus.github.io/posts/Callback…

#infosec
Co11ateral (@co11ateral) 's Twitter Profile Photo

AV-EDR-Killer AV/EDR processes termination by exploiting a vulnerable driver (BYOVD) github.com/xM0kht4r/AV-ED… #dfir #blueteam #redteam #pentesting #windows #byovd

Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - xM0kht4r/VEN0m-Ransomware: Fully undetectable and evasive ransomware written in Rust, leveraging a BYOVD technique to disable AV/EDR solutions on the infected systems. github.com/xM0kht4r/VEN0m…

Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - j3h4ck/UnknownKiller: PoC exploit for the vulnerable (eb.sys or UnknownKiller.sys) – weaponized to kill protected EDR/AV processes via BYOVD. github.com/j3h4ck/Unknown…

Co11ateral (@co11ateral) 's Twitter Profile Photo

Abusing Cortex XDR Live to use a legitimate security solution as a C2 channel labs.infoguard.ch/posts/abusing_… #dfir #blueteam #redteam #pentesting #apt #threathunting

Abusing Cortex XDR Live to use a legitimate security solution as a C2 channel

labs.infoguard.ch/posts/abusing_…

#dfir #blueteam #redteam #pentesting #apt #threathunting
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

apimspray - a specialized Entra ID Passwordspraying Toolkit designed for authorized security research and Red Teaming. It utilizes Azure API Management (APIM) gateways as a distributed, rotating proxy layer for IP Rotating github.com/crtvrffnrt/api…

Nav Singh (@heynavsingh) 's Twitter Profile Photo

🚨 Someone just open sourced a fully autonomous AI hacker and it's terrifying. It's called Shannon. Point it at your web app, and it doesn't just scan for vulnerabilities. It actually exploits them. Real injections. Real auth bypasses. Real database exfiltrations. Not alerts.

🚨 Someone just open sourced a fully autonomous AI hacker and it's terrifying.

It's called Shannon.

Point it at your web app, and it doesn't just scan for vulnerabilities. It actually exploits them. Real injections. Real auth bypasses. Real database exfiltrations.

Not alerts.
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Automated DLL Hijacking Detection Tool with Zero False Positives — Discovers, filters, and canary-confirms exploitable DLL hijacks on Windows with tiered confidence scoring github.com/ghostvectoraca…

Yaniv Radunsky (@hasamba) 's Twitter Profile Photo

VMkatz extracts Windows secrets (NTLM, DPAPI keys, Kerberos tickets, LSA secrets, NTDS.dit) directly from VM snapshots and virtual disks on NAS/hypervisors. Single ~2.5MB binary; supports .vmsn, .vmdk, .sav. #VMkatz #vmdk #ntlm github.com/nikaiw/VMkatz

eleven red pandas (@bytecodevm) 's Twitter Profile Photo

The article demonstrates how to hook COM methods in Windows Subsystem for Linux by leveraging C++ RTTI metadata to reconstruct class layouts and locate virtual methods, enabling precise COM instrumentation without symbols. core-jmp.org/2026/03/wsl-co…

The article demonstrates how to hook COM methods in Windows Subsystem for Linux by leveraging C++ RTTI metadata to reconstruct class layouts and locate virtual methods, enabling precise COM instrumentation without symbols.
core-jmp.org/2026/03/wsl-co…
Co11ateral (@co11ateral) 's Twitter Profile Photo

UnderlayCopy_bof BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell github.com/Muz1K1zuM/Unde… #blueteam #redteam #dfir

UnderlayCopy_bof

BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell

github.com/Muz1K1zuM/Unde…

#blueteam #redteam #dfir