Heappie (@heappie420) 's Twitter Profile
Heappie

@heappie420

Experienced with in-the-field hacking. Arguably enjoy breaking stuff more than fixing it.
One of the founding members of the HTsP CTF team.

ID: 1182180653422534656

linkhttps://htsp.ro/ calendar_today10-10-2019 06:26:54

1,1K Tweet

136 Followers

392 Following

wetw0rk (@wetw0rk_bot) 's Twitter Profile Photo

Have you every wanted to get into Windows Kernel Exploitation but don't know where to start? I'm going be releasing a series to get you from Windows 7 (x86) to Windows 11 (x64). You can find the first tutorial here: wetw0rk.github.io/posts/0x00-int…

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

NetExec has a new Module: TimeroastšŸ”„ In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective! Implemented by Disgame 1/3🧵

NetExec has a new Module: TimeroastšŸ”„

In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!

Implemented by <a href="/Disgame_/">Disgame</a>

1/3🧵
Binni Shah (@binitamshah) 's Twitter Profile Photo

Malware on Steroids Part 3: Machine Learning & Sandbox Evasion : networkintelligence.ai/malware-on-ste… Part 2: Evading Antivirus in a Simulated Organizational Environment : networkintelligence.ai/malware-on-ste… Part 1: Simple CMD Reverse Shell : networkintelligence.ai/malware-on-ste… credits Chetan Nayak (Brute Ratel C4 Author)

eversinc33 šŸ¤šŸ”Ŗā‹†ļ½”Ėš ⋆ (@eversinc33) 's Twitter Profile Photo

Got the transpiler working for my MIPS I VM 🄳Which means that one can basically write plain C with included windows headers and compile it to a PSXecute MIPS module. Also just published the code: github.com/eversinc33/PSX…

Rad (@rad9800) 's Twitter Profile Photo

Another approach to disable EDRs (with anti-tampering). Credit goes to sixtyvividtails for the ideašŸ§™ā€ā™‚ļø PendingFileRenameOperations and an NTFS junction, we can ask Windows to delete EDR binaries on reboot (with Admin privs) A link to a complete GitHub PoC follows in replies

Another approach to disable EDRs (with anti-tampering). Credit goes to <a href="/sixtyvividtails/">sixtyvividtails</a> for the ideašŸ§™ā€ā™‚ļø

PendingFileRenameOperations and an NTFS junction, we can ask Windows to delete EDR binaries on reboot (with Admin privs)

 A link to a complete GitHub PoC follows in replies
Smukx.E (@5mukx) 's Twitter Profile Photo

Linux Read teaming & Exploitation High -> Low Resource. Basic Stuffs [Exploit, Escalate, Persistence] * linode.com/docs/guides/li… * linode.com/docs/guides/li… * linode.com/docs/guides/li… Kernel Stuffs [Exploitation] * scoding.de/linux-kernel-e… * scoding.de/linux-kernel-e…

Linux Read teaming &amp; Exploitation High -&gt; Low Resource.

Basic Stuffs [Exploit, Escalate, Persistence]
* linode.com/docs/guides/li…
* linode.com/docs/guides/li…
* linode.com/docs/guides/li…

Kernel Stuffs [Exploitation]
* scoding.de/linux-kernel-e…
* scoding.de/linux-kernel-e…
Mr. OS (@ksg93rd) 's Twitter Profile Photo

#Red_Team_Tactics 1. BYOVD to the next level: Blind EDR with Windows Symbolic Link zerosalarium.com/2025/01/byovd%… 2. Bypassing character blocklists with unicode overflows portswigger.net/research/bypas…

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

Lateral Movement - Remote Desktop Protocol (RDP) #DFIR Part 1 Event Logs thedfirspot.com/post/lateral-m… Part 2 Artifacts thedfirspot.com/post/lateral-m…

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Patching assembly code to change the behavior of an existing program is not uncommon in malware analysis, software reverse engineering, and broader domains of security research. meterpreter.org/patching-inter…

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Unpatched Windows LNK Vulnerability Enables Remote Execution via UNC Path, PoC Releases A researcher reveals an unpatched Windows LNK flaw that allows UNC-based remote execution and NTLM hash capture. Microsoft declined to issue a fix. securityonline.info/unpatched-wind…