Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile
Adepts of 0xCC

@adeptsof0xcc

A brotherhood of owls praying to the debugger God. Press F7 to step into our prayers!

ID: 1255421565598040065

linkhttps://adepts.of0x.cc calendar_today29-04-2020 09:00:09

89 Tweet

2,2K Followers

6 Following

X-C3LL (@thexc3ll) 's Twitter Profile Photo

Since one of the bugs has been fixed, it's time to confess: I've been tracking and pwning Red Teams and script kiddies using EvilNoVNC and similar shit based on NoVNC and "Browser in Browser".

X-C3LL (@thexc3ll) 's Twitter Profile Photo

I already made a post in Sept 2022 explaining why this technique is not mature enough to be used in real environments, and that the current tools were easily jailbreak-able, allowing anyone to get a shell. adepts.of0x.cc/novnc-phishing/

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

We are at that *secret place* πŸŒ΄πŸ”΄πŸŒ΄. If you want stickers, let us know. Or just approach the guy with the Adepts T-shirt πŸ¦‰πŸ¦‰

We are at that *secret place* πŸŒ΄πŸ”΄πŸŒ΄. If you want stickers, let us know. Or just approach the guy with the Adepts T-shirt 

πŸ¦‰πŸ¦‰
Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

H(owl) h(owl) h(owl)! We still alive and with holidays what means we have time to publish stuff! Check our last post by X-C3LL about lateral movements. Developers are juicy targets: DCOM & Visual Studio => adepts.of0x.cc/visual-studio-…

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Dear Fellowlship, new post in our blog. This time X-C3LL decided to start the year talking about VBA & macros (we would say "enjoy it", but is VBA so... You know...): VBA: having fun with macros, overwritten pointers & R/W/X memory adepts.of0x.cc/vba-hijack-poi…

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Dear Fell(owl)ship, we are experiencing a miracle. Two posts in our blog in the same month! This time X-C3LL's homily is about a product he pwned last xmas. A christmas tale: pwning GTB Central Console (CVE-2024-22107 & CVE-2024-22108) adepts.of0x.cc/gtbcc-pwned/

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Dear Fellowlship, Our owl X-C3LL showed during the EuskalHack VII conclave a technique to achieve stability when overwriting the R/W/X memory in VBA. Read this addendum in our homily: adepts.of0x.cc/vba-rwx-addend…

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

We hope our Fell(owl)ship is enjoying the summer! Time for beach/pool and a quick read of our new post by X-C3LL: Mixing watering hole attacks with history leak via CSS adepts.of0x.cc/css-history-le…

Adepts of 0xCC (@adeptsof0xcc) 's Twitter Profile Photo

Our owl Mario just published a small VM to generate application-layer protocols. Define your protocol from scratch with opcodes! github.com/praetorian-inc…