0xW43L (@ghnimiwael) 's Twitter Profile
0xW43L

@ghnimiwael

Cyber Threat Intelligence Researcher | #OSEP | #eWAPTx | #eJPT

An enthusiastic CyberSec Enthusiast who loves to explore, learn, break, and hack all thing !

ID: 793523100516225024

linkhttps://ghnimiwael.github.io/about/ calendar_today01-11-2016 18:40:24

80 Tweet

622 Takipçi

3,3K Takip Edilen

D Day (@archangeldday) 's Twitter Profile Photo

🚨 NEW BLOG POST: How I Became the Most Valuable Hacker 🚨 🔥 My best hacking month ever 🥇 1st place 🏆 MVH belt Here's what I used to snag HackerOne 's ultimate prize. 2025 is YOUR year to get the belt! douglas.day/2024/12/13/How… #BugBounty #Hacking #MVH

0xW43L (@ghnimiwael) 's Twitter Profile Photo

What if CTI, Red Teaming, & SOCs worked seamlessly together? That’s the idea behind TACTFlow—a project to: 1. Map TTPs to real attack use cases 2. Smarter detection for SOCs 3. Turn CTI insights into action seamlessly Full Details on my blog: lnkd.in/d3kSQKzA

What if CTI, Red Teaming, & SOCs worked seamlessly together?

That’s the idea behind TACTFlow—a project to:
1. Map TTPs to real attack use cases
2. Smarter detection for SOCs
3. Turn CTI insights into action seamlessly

Full Details on my blog: lnkd.in/d3kSQKzA
0xW43L (@ghnimiwael) 's Twitter Profile Photo

New #TACTFlow posts are live! 1. 0x2: Initial Access – How attackers breach defenses 2. 0x3: Phishing – The ever-evolving threat 3. 0x3.1: Spearphishing Attachments (T1566.001) – Targeted payloads & bypassing security Post Link : ghnimiwael.github.io/posts/TACTFlow… #RedTeaming #CTI #SOC

New #TACTFlow posts are live!
1. 0x2: Initial Access – How attackers breach defenses
2. 0x3: Phishing – The ever-evolving threat
3. 0x3.1: Spearphishing Attachments (T1566.001) – Targeted payloads & bypassing security

Post Link : ghnimiwael.github.io/posts/TACTFlow…

#RedTeaming #CTI #SOC
vx-underground (@vxunderground) 's Twitter Profile Photo

Someone has done an excellent job collecting RATs and documenting them by version. They also included images. A+ work. This is amazing (we're going to ingest this eventually) github.com/Cryakl/Ultimat…

hasherezade (@hasherezade) 's Twitter Profile Photo

A small demo/tutorial on unpacking executables with #PEsieve and #TinyTracer: hshrzd.wordpress.com/2025/03/22/unp… - automatic OEP finding, reconstructing IAT, avoiding antidebugs and fixing imports broken by shims

YungBinary (@yungbinary) 's Twitter Profile Photo

The Long and Short(cut) of It: KoiLoader Analysis is a new blog that dives deep into #KoiLoader and provides security researchers with python scripts to ease the analysis process, including a full C2 emulation script. Check it out here: esentire.com/blog/the-long-…

The Long and Short(cut) of It: KoiLoader Analysis is a new blog that dives deep into #KoiLoader and provides security researchers with python scripts to ease the analysis process, including a full C2 emulation script.

Check it out here: esentire.com/blog/the-long-…
Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] Bypassing Windows Kernel Mitigations: Part0 - Deep Dive into KASLR Leaks Restriction hackyboiz.github.io/2025/04/13/l0c… In this post, we’ll take a closer look at the new KASLR-related mitigation introduced in Windows 11 and Windows Server 24H2, and explore a novel method for

[Research] Bypassing Windows Kernel Mitigations: Part0 - Deep Dive into KASLR Leaks Restriction

hackyboiz.github.io/2025/04/13/l0c…

In this post, we’ll take a closer look at the new KASLR-related mitigation introduced in Windows 11 and Windows Server 24H2, and explore a novel method for
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

NetExec v1.4.0 has been released! 🎉 There is a HUGE number of new features and improvements, including: - backup_operator: Automatic priv esc for backup operators - Certificate authentication - NFS escape to root file system And much more! Full rundown: github.com/Pennyw0rth/Net…

NetExec v1.4.0 has been released! 🎉

There is a HUGE number of new features and improvements, including:
- backup_operator: Automatic priv esc for backup operators
- Certificate authentication
- NFS escape to root file system

And much more!
Full rundown:
github.com/Pennyw0rth/Net…
Maurice Heumann (@momo5502) 's Twitter Profile Photo

Holy shit :O After days of struggle, my emulator now runs in the browser 🙌 I managed to compile it to webassembly so that it can emulate 64 bit windows binaries right in your browser. Go try it out :D momo5502.github.io/emulator

Holy shit :O After days of struggle, my emulator now runs in the browser 🙌

I managed to compile it to webassembly so that it can emulate 64 bit windows binaries right in your browser.

Go try it out :D

momo5502.github.io/emulator
0xW43L (@ghnimiwael) 's Twitter Profile Photo

Just built a LDAP enumeration tool for red teamers ! - Extracts users, groups, password policies - Finds privileged accounts & sensitive fields - Supports auth & anonymous LDAP queries Perfect for AD security assessments & privilege escalation! github.com/GhnimiWael/LDA…

Just built a LDAP enumeration tool for red teamers !

- Extracts users, groups, password policies
- Finds privileged accounts & sensitive fields
- Supports auth & anonymous LDAP queries

Perfect for AD security assessments & privilege escalation!

github.com/GhnimiWael/LDA…
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Modern obfuscation techniques - a great weekend read. Master's thesis (by Roman Oravec) investigates various common obfuscation techniques and freely available implementations, focusing on the LLVM Pass Framework's potential for program obfuscation. Additionally, several

Modern obfuscation techniques - a great weekend read.

Master's thesis (by Roman Oravec) investigates various common obfuscation techniques and freely available implementations, focusing on the LLVM Pass Framework's potential for program obfuscation.

Additionally, several
Kyle Cucci (@d4rksystem) 's Twitter Profile Photo

I've been poking at #Golang malware a bit lately and wrote up some tips/tricks that I use when analyzing Golang. Josh Stroschein | The Cyber Yeti and I just talked about this on his live stream too. Check it out here -> (The livestream replay is linked in the blog post) 🤓 securityliterate.com/go-big-or-go-h…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST! Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆 Get ready → bit.ly/4ofb5g8 #FlareOn12

The 12th Annual Flare-On Challenge kicks off Sept 26 at 8PM EST!

Reverse engineering pros, from Windows to Web3 (with a YARA twist), it's your time to shine. 🏆

Get ready → bit.ly/4ofb5g8

#FlareOn12
Ron BY (@ronb_y) 's Twitter Profile Photo

Speaking at DEF CON was as fun as always! My new tool called RPC-Racer is now available. It masquerades as a legitimate RPC server to force a protected process to authenticate against an arbitrary server github.com/SafeBreach-Lab…

Print3M // SecTube.tv (@print3m_) 's Twitter Profile Photo

"Turning Microsoft's Login Page into our Phishing Infrastructure". Super hot research from this year's DEF CON by Keanu Nys 🔥🚨 #phishing #redteam #defcon media.defcon.org/DEF%20CON%2033…

"Turning Microsoft's Login Page into our Phishing Infrastructure". Super hot research from this year's <a href="/defcon/">DEF CON</a> by <a href="/RedByte1337/">Keanu Nys</a> 🔥🚨

#phishing #redteam #defcon 

media.defcon.org/DEF%20CON%2033…