CodeX (@codex_tf2) 's Twitter Profile
CodeX

@codex_tf2

advanced persistent clown 🤡
📕 redteam blog: codex-7.gitbook.io
🛠️ github: github.com/CodeXTF2

ID: 1493617775738167297

linkhttp://codex-7.gitbook.io calendar_today15-02-2022 16:07:00

877 Tweet

1,1K Takipçi

207 Takip Edilen

CodeX (@codex_tf2) 's Twitter Profile Photo

wtf is this high effort hextech chest meme youtu.be/TYzQ5GnhbWY rip the hextech memes but at least we got the chests back

Tim (@__invictus_) 's Twitter Profile Photo

All Red Teamers should be aware of post beacon loss syndrome, and the stages that you go through. Denial - "the user has probably just gone offline for the day", "maybe my redirector is fucked", "did I crash the process".

Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

FaceDancer is an exploitation tool aimed at creating hijackable, proxy-based DLLs by taking advantage of COM-based system DLL image loading github.com/Tylous/FaceDan…

Yehuda Smirnov (@yudasm_) 's Twitter Profile Photo

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…

volatility (@volatility) 's Twitter Profile Photo

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-the…

Rad (@rad9800) 's Twitter Profile Photo

Learn to evade and strengthen security controls by building your own ransomware. For a teaser on what to expect, check out my talk 'Windows Ransomware Detection' youtu.be/5t67BFcC-MQ Excited to have y'all join us next month.

Kyle Avery (@kyleavery_) 's Twitter Profile Photo

So excited to speak at #BHUSA for the first time this year! I'll talk about training LLMs on verifiable tasks (including what exactly that means) with a case study automating some maldev work.

Logan Goins (@_logangoins) 's Twitter Profile Photo

I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

Matt Ehrnschwender (@m_alphaaa) 's Twitter Profile Photo

I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. github.com/MEhrn00/boflink Supporting blog post about it. blog.cybershenanigans.space/posts/boflink-…

5pider (@c5pider) 's Twitter Profile Photo

Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also implementing your own ransomware/decryptor for Windows, MacOS and Linux. See you soon! 👻

Truly excited for the upcoming workshop. Covering modern ransomware evasion & detection and also  implementing your own ransomware/decryptor for Windows, MacOS and Linux.
See you soon! 👻
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender. COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore... A post by es3n1n. Nicely done! Repo:

Swimming deep inside Windows Security Center service to re-engineer API access allowing to disable Windows Defender.

COM interface reconstruction and integrity checks bypassed to inform WD that its not the-boss-in-the-house anymore...

A post by <a href="/es3n1n/">es3n1n</a>. Nicely done!

Repo:
trickster0 (@trickster012) 's Twitter Profile Photo

This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…