Max dcb (@max2cbx) 's Twitter Profile
Max dcb

@max2cbx

OSCP|CRTO - Senior Information Security Engineer

ID: 1470408542909878273

calendar_today13-12-2021 15:01:51

13 Tweet

100 Followers

91 Following

Ptrace Security GmbH (@ptracesecurity) 's Twitter Profile Photo

TeamServer and Client of Exploration Command and Control Framework github.com/maxDcb/C2TeamS… #Pentesting #CyberSecurity #Infosec

TeamServer and Client of Exploration Command and Control Framework github.com/maxDcb/C2TeamS… #Pentesting #CyberSecurity #Infosec
Max dcb (@max2cbx) 's Twitter Profile Photo

🧪 New technique: DreamWalkers A reflective shellcode loader that crafts a synthetic, clean call stack. Achieving stealthy execution from memory-mapped modules. 🔗 maxdcb.github.io/DreamWalkers/ #MalwareResearch #RedTeam #WindowsInternals #OffSec

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

A new life of reflective DLLs - fixing call stacks. Registering a proper unwinding information from .pdata section with RtlAddFunctionTable() helps fixing the call stack of a function called from within reflective DLL. Example implementation called DreamWalkers and other

A new life of reflective DLLs - fixing call stacks.

Registering a proper unwinding information from .pdata section with RtlAddFunctionTable() helps fixing the call stack of a function called from within reflective DLL.

Example implementation called DreamWalkers and other
Max dcb (@max2cbx) 's Twitter Profile Photo

🕸 OpenShiftGrapher: A graph based tool to map, exploit & secure OpenShift clusters. Perfect for pentesters to uncover: 🔸 RBAC abuse paths 🔸 Privilege escalation via SCCs 🔸 Risky misconfigs 📝 Read: maxdcb.github.io/OpenShiftGraph… #RedTeam #Pentest #Kubernetes