bakki (@avx128) 's Twitter Profile
bakki

@avx128

19yo \\\ b2b saas cyberweapon engineer \\\ github.com/xrombar

ID: 1601319091373064192

linkhttps://sillywa.re calendar_today09-12-2022 20:53:42

639 Tweet

811 Followers

92 Following

bakki (@avx128) 's Twitter Profile Photo

next blogpost will be about tunneling, remote operations and cooler implant designs i will drop the tunneling project and it's core component as a separate lib

Octoberfest7 (@octoberfest73) 's Twitter Profile Photo

I don't pay for premium, so please read the longform in the picture. TLDR: Cool new VS x86/x64 shellcode template from alex short ๐Ÿ‡บ๐Ÿ‡ฆ at github.com/rbmm/SC_DEMO, he lives in Ukraine and is looking for remote work, help him make a connection if you can.

I don't pay for premium, so please read the longform in the picture. TLDR: Cool new VS x86/x64 shellcode template from <a href="/alexsho71327477/">alex short ๐Ÿ‡บ๐Ÿ‡ฆ</a> at github.com/rbmm/SC_DEMO, he lives in Ukraine and is looking for remote work, help him make a connection if you can.
chebuya (@_chebuya) 's Twitter Profile Photo

Found an SSRF in Sliver C2 (CVE-2025-27090), allowing an attacker to read and write TCP traffic through affected teamservers. Demo shows leaking the IP of a Sliver teamserver hidden behind redirectors Writeup and PoC in replies

Joe Desimone (@dez_) 's Twitter Profile Photo

A lot of fun techniques coming out of the mdsec crew! Fortunately, this one is fairly easy to spot github.com/elastic/protecโ€ฆ

bells (@bellafusari1) 's Twitter Profile Photo

Hi friends!! ๐Ÿฉท Iโ€™m looking for a new RE role to support me while Iโ€™m in grad school! Iโ€™ll be kind of in the woods, so remote roles are preferred! Recently Iโ€™ve been doing firmware RE/VR, but I got started doing malware RE and I love it lots (1/3)

pygrum (@spygrum) 's Twitter Profile Photo

Been working on a rule engine for dynamic malware analysis - ingests telemetry from a 'sensor' and runs rules and sequences of rules on event data it receives. Currently writing the flagship sensor, but the library itself is available to experiment with: github.com/badhive/alca

Dominic Chell ๐Ÿ‘ป (@domchell) 's Twitter Profile Photo

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch ๐Ÿ™ MDSec

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch ๐Ÿ™ <a href="/MDSecLabs/">MDSec</a>
pygrum (@spygrum) 's Twitter Profile Photo

I've finished most of the development for Governor, the flagship Windows 'sensor' / telemetry source for the ALCA engine. Governor can now be used alongside ALCA for dynamic signaturing of Windows malware github.com/badhive/alca github.com/badhive/governโ€ฆ

๐™ ๐™€ ๐™‡ ๐™„ ๐™“ ๐™ˆ (@felixm_pw) 's Twitter Profile Photo

With some guidance from DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation ๐Ÿ’ค blog.felixm.pw/rude_awakeningโ€ฆ

Rad (@rad9800) 's Twitter Profile Photo

We listened when folk told us minutes matter, with attacks around the cloud often automated and notoriously fast. We offer sub-second latency detections for AWS honey tokens (long lived access keys), across every AWS region. No other vendor currently comes close to this (most

We listened when folk told us minutes matter, with attacks around the cloud often automated and notoriously fast.

We offer sub-second latency detections for AWS honey tokens (long lived access keys), across every AWS region.

No other vendor currently comes close to this (most
/หˆziหf-kษ’n/ (@x33fcon) 's Twitter Profile Photo

๐Ÿ› ๏ธJoin Rad and 5pider for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows

๐Ÿ› ๏ธJoin <a href="/rad9800/">Rad</a> and <a href="/C5pider/">5pider</a> for onsite-only workshop at #x33fcon! Build a fully functional ransomware prototype and uncover the mechanics behind this persistent threat. Learn file encryption, stealth tactics, and how to bypass anti-ransomware tools, with a deep dive into Windows