0x12 Dark Development (@salsa12__) 's Twitter Profile
0x12 Dark Development

@salsa12__

Red Teamer focused in Malware Development

Academy: 0x12darkdev.net

GitHub: github.com/S12Cybersecuri…

Medium: medium.com/@s12deff

ID: 1497201686963707911

linkhttps://0x12darkdev.net calendar_today25-02-2022 13:28:12

351 Tweet

147 Followers

60 Following

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Reversing a Vulnerable Driver: Discovering a Process Termination Primitive New Medium post, in this one see the reversing process of a vulnerable Windows kernel driver to understand how it can be abused to terminate arbitrary processes from kernel medium.com/@s12deff/rever…

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Just finished the PPL disable from R/W Kernel BYOVD Soon on Medium, what do you think? Still need some help with PatchGuard. One dirty trick could be to disable PPL, do the malicious stuff, and then re-enable it right away

Just finished the PPL disable from R/W Kernel BYOVD 

Soon on Medium, what do you think?

Still need some help with PatchGuard. One dirty trick could be to disable PPL, do the malicious stuff, and then re-enable it right away
0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Abusing a vulnerable driver BYOVD to gain arbitrary kernel R/W and bypass PPL protection New Medium post. In this one, we will explore a technique used in offensive security that allows us to bypass PPL by abusing a vulnerable driver with R/W kernel vuln medium.com/@s12deff/abusi…

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

ActiveProcessLinks in EPROCESS Structure New Medium post. In this article, I provide a clear explanation of the ActiveProcessLinks field within the EPROCESS structure medium.com/@s12deff/activ…

ActiveProcessLinks in EPROCESS Structure

New Medium post. In this article, I provide a clear explanation of the ActiveProcessLinks field within the EPROCESS structure

medium.com/@s12deff/activ…
0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Bypassing Code Integrity Using BYOVD for Kernel R/W Primitives New Medium post, in this one we will explore a technique used in offsec that allows us to disable CI (Code Integrity “Policies”) by abusing a vulnerable driver with Kernel R/W vuln medium.com/@s12deff/bypas…

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Looking to collaborate with companies or individuals in pentesting. I can build custom agents, implants, and offensive tooling. Open to projects, let’s work together ;)

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

Persistence via Startup Directory New Medium post. In this article, I’ll walk you through one of the most basic (yet still abused) techniques for achieving persistence in the offensive Windows security medium.com/@s12deff/persi…

0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

[+] Local Privilege Escalation Completed from Kernel R/W If I have enough time, I’ll post it on Medium tomorrow ;) 🎶 youtube.com/watch?v=fFtvI0…

[+] Local Privilege Escalation Completed from Kernel R/W

If I have enough time, I’ll post it on Medium tomorrow ;)

🎶
youtube.com/watch?v=fFtvI0…