Dankitani (@dankitan) 's Twitter Profile
Dankitani

@dankitan

ID: 4334040928

calendar_today30-11-2015 23:50:13

109 Tweet

40 Takipçi

459 Takip Edilen

Hussein Daher (@hussein98d) 's Twitter Profile Photo

Giveaway time! I will send 3 copies of my hacking workshop done at THREAT CON. That's +12 hours of content 🔥 ✅ Like 🔁 RT the post ✅ Follow 👉🏿 Giveaway ends at reaching 20k Followers 🌟

Giveaway time! I will send 3 copies of my hacking workshop done at <a href="/THREAT_CON/">THREAT CON</a>. That's +12 hours of content 🔥

✅ Like
🔁 RT the post
✅ Follow

👉🏿 Giveaway ends at reaching 20k Followers 🌟
d00rt (@d00rt_rm) 's Twitter Profile Photo

Finally, we've released my last investigation on the recent attacks of #andariel #apt group. It covers the previous work done by Kaspersky Malwarebytes and KrCERT/CC . Where we study the code reuse and evolution of #TigerRAT #TigerDownloader. Enjoy :) #malware

Hussein Daher (@hussein98d) 's Twitter Profile Photo

I will also giveaway 1 copy to a random person who retweetd this . 400 followers to go 🌟🌟🌟🌟🌟🌟🌟 #BugBounty

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s noob3xploiter.medium.com/hacking-the-dl… #Hacking #ReverseEngineering #Infosec

Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s  noob3xploiter.medium.com/hacking-the-dl… #Hacking #ReverseEngineering #Infosec
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

Finally got around to adding training material from my #defcon 29 workshop "Modern Malware Analysis for Threat Hunters". 👉 github.com/jstrosch/malwa…

Finally got around to adding training material from my #defcon 29 workshop "Modern Malware Analysis for Threat Hunters". 

👉 github.com/jstrosch/malwa…
Soumyadeep Basu (@soumyadeepbas12) 's Twitter Profile Photo

Process injection via the KernelCallBackTable involves replacing original callback function by custom payload so that whenever the function is invoked, payload will be triggered. In this case the fnCOPYDATA callback function has been used. C# code snippet: gist.github.com/sbasu7241/5dd8…

Process injection via the KernelCallBackTable involves replacing original callback function by custom payload so that whenever the function is invoked, payload will be triggered. In this case the fnCOPYDATA callback function has been used.
C# code snippet: gist.github.com/sbasu7241/5dd8…
elhacker.NET (@elhackernet) 's Twitter Profile Photo

Investigadores encuentran múltiples puertas traseras en el popular dispositivo VoIP fabricado por el fabricante alemán Auerswald ↘️CVE-2021-40859 -> CVSS 9.8 ↘️CVE-2021-40856 ↘️CVE-2021-40857 blog.redteam-pentesting.de/2021/inside-a-… 🔁Actualizaciones firmware disponibles: auerswald.de/en/start/news/…

Investigadores encuentran múltiples puertas traseras en el popular dispositivo VoIP fabricado por el fabricante alemán Auerswald
↘️CVE-2021-40859  -&gt; CVSS 9.8
↘️CVE-2021-40856
↘️CVE-2021-40857
blog.redteam-pentesting.de/2021/inside-a-…
🔁Actualizaciones firmware disponibles:
auerswald.de/en/start/news/…
wrongbaud (@wrongbaud) 's Twitter Profile Photo

New blog series: Intro to Embedded RE Part 1: Tools and Series Overview voidstarsec.com/blog//2022/01/… The next post releases on Friday, I'm looking forward to sharing this work with the community!

Mr. Rc (@rcx86) 's Twitter Profile Photo

Windows internals resources that I have collected in around an year #infosec Win32 programming with code examples: installsetupconfig.com/win32programmi… Notes for Windows API programming; caiorss.github.io/C-Cpp-Notes/Wi… Windows undocumented functions' docs: undoc.airesoft.co.uk

hacksys (@flopyash) 's Twitter Profile Photo

[Red Team] "Advanced Process Injection Techniques" Workshop is now LIVE ! Workshop Outline : PE Basics APC injection Module Stomping Process Hollowing Process Doppelgänging Transacted Hollowing Process Herpaderping Process Ghosting Code Repo : github.com/RedTeamOperati…

[Red Team] "Advanced Process Injection Techniques" Workshop is now LIVE !

Workshop Outline : 

PE Basics
APC injection
Module Stomping
Process Hollowing
Process Doppelgänging
Transacted Hollowing
Process Herpaderping
Process Ghosting

Code Repo : github.com/RedTeamOperati…
Binni Shah (@binitamshah) 's Twitter Profile Photo

Shielder - Reversing embedded device bootloader (U-Boot) - Part 2 : shielder.com/blog/2022/03/r… Part 1 : shielder.com/blog/2022/03/r…

Shielder - Reversing embedded device bootloader (U-Boot) - Part 2 : shielder.com/blog/2022/03/r… 

Part 1 : shielder.com/blog/2022/03/r…
Kieran Drew (@itskierandrew) 's Twitter Profile Photo

Do you sit at a computer for longer than 6 hours a day? You’re destroying your body if so. Here’s the setup you need to protect yourself from posture problems and crippling long-term injuries: 🧵

Do you sit at a computer for longer than 6 hours a day?

You’re destroying your body if so.

Here’s the setup you need to protect yourself from posture problems and crippling long-term injuries: 

🧵
Mr. Rc (@rcx86) 's Twitter Profile Photo

Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources that helped me along the way in the following tweets. Trust me, you won't be disappointed! 🧵 #infosec

Are you interested in learning reverse engineering in 2023?
I've spent the this year studying RE, and I want to share all the resources that helped me along the way in the following tweets. Trust me, you won't be disappointed! 🧵

#infosec
Ricardo Narvaja (@ricnar456) 's Twitter Profile Photo

As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt. github.com/fortra/CVE-202…

ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…