RET2Pwn (@ret2_pwn) 's Twitter Profile
RET2Pwn

@ret2_pwn

#24 y/o | Binary Exploitation Player | Wannabe Malware Developer & Researcher

ID: 1091813815518445574

calendar_today02-02-2019 21:41:13

166 Tweet

1,1K Takipçi

467 Takip Edilen

Saif (@wr3nchsr) 's Twitter Profile Photo

About a year ago, I discovered a couple of vulnerabilities in PAX Technology, Inc (North America)'s paydroid system and the CVEs were published in December 2022. Here's a showcase of what chaining those vulnerabilities can achieve on a production mode point of sale terminal.

Bobby Cooke (@0xboku) 's Twitter Profile Photo

We've just released the first post in the Cobalt Strike reflective loader blog series! 🥷This one took allot of effort and I am excited to share it with you! The better it does, the better i'll make the next ones 😉 securityintelligence.com/posts/defining…

Stan Hegt (@stanhacked) 's Twitter Profile Photo

Outflank blog: Attacking Visual Studio for Initial Access. The post shows how viewing source code can lead to compromise of a dev's workstation. A journey into COM, type libraries and the inner workings of VS. Plus practical examples for red team ops. outflank.nl/blog/2023/03/2…

Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…

Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…
f1zm0 (@f1zm0) 's Twitter Profile Photo

I've just released acheron, a package that you can use to add indirect syscalls capabilities to your Go tradecraft. github.com/f1zm0/acheron

RET2Pwn (@ret2_pwn) 's Twitter Profile Photo

I'm proud to announce 2 new features that I've been working on: Reverse Port Forwarding & Agent Customization. With Agent Customization, you can now generate an agent with only the features needed for a particular engagement - no more using full feature sets if no need. #RedTeam

I'm proud to announce 2 new features that I've been working on: Reverse Port Forwarding & Agent Customization. With Agent Customization, you can now generate an agent with only the features needed for a particular engagement - no more using full feature sets if no need. 
#RedTeam
Mohamed Sayed (ret2flex) 🇵🇸 (@flex0geek) 's Twitter Profile Photo

i tried to deeply understand and write an exploit code for CVE-2021-3156 Heap Overflow in sudo github.com/flex0geek/cves… #exploit #pwn #cve_2021_3156

RET2Pwn (@ret2_pwn) 's Twitter Profile Photo

NEW BLOG POST!!📢🔥 In this blog post, I have shared my notes from my exploration of the clipboard, including my attempts to dump the clipboard history even if it has been deleted. At the end, I wrote a CME module. xret2pwn.github.io/The-Art-of-Cli… Peace out! ✌ #cybersecurity #redteam

NEW BLOG POST!!📢🔥
In this blog post, I have shared my notes from my exploration of the clipboard, including my attempts to dump the clipboard history even if it has been deleted. At the end, I wrote a CME module.
xret2pwn.github.io/The-Art-of-Cli…
Peace out! ✌

#cybersecurity  #redteam
S4ntiagoP (@s4ntiago_p) 's Twitter Profile Photo

🔥 Big update! Nanodump now supports the PPLMedic exploit! meaning you can dump LSASS on an up-to-date system with PPL enabled 😃 github.com/fortra/nanodump

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

My team mate @m_fielenbach recently created a python script to automate the process of discovering and exploiting ESC1 & ESC8 ADCS vulnerabilities: 🙌 github.com/grimlockx/ADCS… So if you want to save some minutes of time in your next projects feel free to test it out. 🔥

My team mate @m_fielenbach recently created a python script to automate the process of discovering and exploiting ESC1 & ESC8 ADCS vulnerabilities: 🙌

github.com/grimlockx/ADCS…

So if you want to save some minutes of time in your next projects feel free to test it out.  🔥
x86matthew (@x86matthew) 's Twitter Profile Photo

First blog post in a while! This article describes an undocumented trick to embed executable code within (what appears to be) a read-only PE section. secret.club/2023/06/05/spo…

First blog post in a while! This article describes an undocumented trick to embed executable code within (what appears to be) a read-only PE section.

secret.club/2023/06/05/spo…
Ido Veltzman (@idov31) 's Twitter Profile Photo

I'm glad to release Jormungandr! Jormungandr is a kernel COFF loader inspired by TrustedSec's COFF loader that allows kernel developers to write and execute their COFFs in the kernel and making more modular rootkits. github.com/Idov31/Jormung… #infosec #cybersecurity

eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy! eversinc33.com/posts/anti-ant…