BlackSnufkin (@blacksnufkin42) 's Twitter Profile
BlackSnufkin

@blacksnufkin42

#RedTeam & #MalwareDev | #CRTL
Just a pirate in the Cyber sea 🏴‍☠️

ID: 1175485033899077634

linkhttps://github.com/BlackSnufkin calendar_today21-09-2019 19:01:04

291 Tweet

504 Followers

483 Following

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

Added 2 new #rust program to my repo 1. defender exclusions enum without admin 2. hide dll from memory scanner (pe-sieve) #redteam github.com/BlackSnufkin/R…

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

i have just upgraded the defender enumeration so now it will also get enabled ASR rules and allowed threat on the system also the code can be changed to get also protection history

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

A powershell script to dump windows defender config and history without admin privileges #redteam #poweshell github.com/BlackSnufkin/I…

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

New tool release: NyxInvoke is a Rust CLI tool for running .NET assemblies, PowerShell, and BOFs with Patchless AMSI and ETW bypass features. #Rust #RedTeam github.com/BlackSnufkin/N…

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

Tired of switching tools for payload testing? LitterBox - bringing Moneta, PE-sieve & more into one unified platform. github.com/BlackSnufkin/L… #RedTeam #MalwareDev #CRTL

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

Tool Update: LitterBox v1.5 What's New: - New scanner RedEdr added to the arsenal. - Refactored some server-side code for better performance. - Major UX/UI improvements for smoother navigation. #MalwareDev #sandbox #RedTeam

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

Ohhhh snap now you can use Claude in your #maldev and #redteam workflow LitterBox v3.0.0: GrumpyCats python client & #MCP server that can be used to interact with LitterBox #sandbox See it in action

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

WTF Anthropic just outright banned me with zero warning or explanation. 🤨 Didn’t break any rules so what gives? Anyone else getting ghost-banned?

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

The CVE system is broken. You report the vuln with PoC, videos, and analysis. The vendor stalls. Someone else uses CNA access, skips disclosure, and gets the CVE. No checks. No credit. Speed wins. Makes you wonder why anyone discloses at all. CVE MITRE

BlackSnufkin (@blacksnufkin42) 's Twitter Profile Photo

starting to think responsible disclosure is pointless. you give them everything PoC, videos, proper contact and while they stall, someone with CNA access pushes it through and gets the CVE. anyone else run into this bullshit? CVE MITRE

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

CVEs aren’t always what they seem. In Chapter 0 of From Day Zero to Zero Day, I walk through examples (like curl and Postgres) where CVEs were assigned, but no "real" vulnerability existed. What I show in the book: 🦝 CVEs are managed by a decentralized system of CNAs. 🦝 Some

CVEs aren’t always what they seem.

In Chapter 0 of From Day Zero to Zero Day, I walk through examples (like curl and Postgres) where CVEs were assigned, but no "real" vulnerability existed.

What I show in the book:
🦝 CVEs are managed by a decentralized system of CNAs.
🦝 Some