Daniel Jary (@janieldary) 's Twitter Profile
Daniel Jary

@janieldary

Security researcher

ID: 1429795320993562627

linkhttps://github.com/JanielDary calendar_today23-08-2021 13:20:32

55 Tweet

140 Followers

356 Following

Elliot (@elliotkillick) 's Twitter Profile Photo

Calling all experts in Windows internals and low-level systems architecture! 'The Root of DllMain Problems' (or 'DllMain Rules Rewritten') is now in preparation for its final publication! Feedback and sign-offs from the community are greatly appreciated. github.com/ElliotKillick/…

Gabriel Landau (@gabriellandau) 's Twitter Profile Photo

Introducing a new Windows vulnerability class: False File Immutability. 👉 Bonus: a kernel exploit to load unsigned drivers. elastic.co/security-labs/…

Virus Bulletin (@virusbtn) 's Twitter Profile Photo

At #VB2024 Daniel Jary will dig into techniques used to maliciously load Shared Objects & describe ways to detect them. He'll present a tool that identifies SO injection, shellcode injection, process hollowing &entry point manipulation of running processes virusbulletin.com/conference/vb2…

At #VB2024 <a href="/JanielDary/">Daniel Jary</a> will dig into techniques used to maliciously load Shared Objects &amp; describe ways to detect them. He'll present a tool that identifies SO injection, shellcode injection, process hollowing &amp;entry point manipulation of running processes virusbulletin.com/conference/vb2…
Daniel Jary (@janieldary) 's Twitter Profile Photo

My talk from earlier in the year Black Hat #BlackHatAsia just got posted. Immoral Fiber: Unlocking & Discovering New Offensive Capabilities of Fibers youtu.be/LdrqX5Nhe94?fe…

Hors (@horsicq) 's Twitter Profile Photo

obfus.h is the powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity #Obfuscation #infosec github.com/DosX-dev/obfus…

obfus.h is the powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. 
#CodeSecurity #Obfuscation #infosec 

github.com/DosX-dev/obfus…
Zerotistic (@gegrgtezrze) 's Twitter Profile Photo

Excited to share my latest blog post: "Breaking Control Flow Flattening: A Deep Technical Analysis" I showcase usage of formal proofs and graph theory to automate CFF deobfuscation, among other things ! Might make it a talk...? 👀 zerotistic.blog/posts/cff-remo…

Rasta Mouse (@_rastamouse) 's Twitter Profile Photo

[BLOG] This post summarises how to tie Cobalt Strike's UDRL, SleepMask, and BeaconGate together for your syscall and call stack spoofing needs. rastamouse.me/udrl-sleepmask…

Daniel Jary (@janieldary) 's Twitter Profile Photo

Virus Bulletin (VB) just released my talk & white paper on Shared Object injection & detection on Linux. Pleasure to be invited & attend. Great conference guys! Virus Bulletin #VB #VirusBulletin #Linux virusbulletin.com/conference/vb2… youtube.com/watch?v=x6pHvr…

x86matthew (@x86matthew) 's Twitter Profile Photo

I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/… Project: github.com/x86matthew/Win…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today. en.r-tec.net/r-tec-blog-byp…

Bypass AMSI in 2025, my newest blog post is published 🥳! A review on what changed over the last years and what's still efficient today.

en.r-tec.net/r-tec-blog-byp…
T3nb3w (@t3nb3w) 's Twitter Profile Photo

🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research! 🔍 Blog: mohamed-fakroud.gitbook.io/red-teamings-d… 💻 Code: github.com/T3nb3w/ComDotN…

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Thread Execution Hijacking is one of the well-known methods that can be used to run implanted code. In this blog we introduce a new injection method, that is based on this classic technique, but much stealthier - Waiting Thread Hijacking. Read More : research.checkpoint.com/2025/waiting-t…

Outflank (@outflanknl) 's Twitter Profile Photo

Here's our new blog on hiding your implant in VTL1, where even an EDR's kernel sensor can't see it.🧑‍🦯 Post includes full operational details. Plus our OST offering has been updated with a Cobalt Strike sleep mask exploiting secure enclaves. Full read ➡️ outflank.nl/blog/2025/06/1…