safe (@safe0x17) 's Twitter Profile
safe

@safe0x17

Red Team Operator

ID: 1769330960678436864

linkhttp://github.com/safedv calendar_today17-03-2024 11:52:47

16 Tweet

254 Followers

208 Following

safe (@safe0x17) 's Twitter Profile Photo

I'm excited to share ๐—ฅ๐˜‚๐˜€๐˜๐—ถ๐—ฐ๐Ÿฒ๐Ÿฐ. A Modern 64-bit ๐—ฃ๐—ผ๐˜€๐—ถ๐˜๐—ถ๐—ผ๐—ป-๐—œ๐—ป๐—ฑ๐—ฒ๐—ฝ๐—ฒ๐—ป๐—ฑ๐—ฒ๐—ป๐˜ Shellcode Template for ๐—ช๐—ถ๐—ป๐—ฑ๐—ผ๐˜„๐˜€, written ๐—ถ๐—ป ๐—ฅ๐˜‚๐˜€๐˜! #rustlang #CyberSecurity #redteam github.com/safedv/Rustic64

Ebalo (@ebalo_lts) 's Twitter Profile Photo

New on Medium: Analyzing the Rustic64 Project for building #Windows #Shellcode in #Rust. ๐Ÿฆ€๐Ÿ’ป Explore #PIC shellcode creation and dive into the code architecture! Check it out here: ๐Ÿ”— link.medium.com/depGXMredNb #Cybersecurity #RustLang #MalwareDevelopment

safe (@safe0x17) 's Twitter Profile Photo

๐Ÿš€ Just dropped Rustic64Shellโ€”64-bit position-independent reverse tcp shell for Windows, built in Rust! ๐Ÿ˜Ž github.com/safedv/Rustic6โ€ฆ #RedTeam #EthicalHacking #CyberSecurity

Ebalo (@ebalo_lts) 's Twitter Profile Photo

Choosing the right #cybersecurity #certifications can feel like a maze ๐Ÿงฉ. Iโ€™ve shared some #tips on how to avoid common pitfalls and align your #CertificationPath with your #CareerGoals. Check it out at link.medium.com/QWxcdtHnlNb #InfoSec #CyberPath

safe (@safe0x17) 's Twitter Profile Photo

๐Ÿฆ€ RustiveDump can now be compiled ๐—ฎ๐˜€ ๐˜€๐—ต๐—ฒ๐—น๐—น๐—ฐ๐—ผ๐—ฑ๐—ฒ (๐—ฃ๐—œ๐—–) using the ๐—ฅ๐˜‚๐˜€๐˜๐—ถ๐—ฐ๐Ÿฒ๐Ÿฐ ๐—ฑ๐—ฒ๐˜€๐—ถ๐—ด๐—ป. LSASS memory dumper using only ๐—ก๐—ง ๐—”๐—ฃ๐—œ๐˜€, supporting ๐—ซ๐—ข๐—ฅ and ๐—ฟ๐—ฒ๐—บ๐—ผ๐˜๐—ฒ ๐˜๐—ฟ๐—ฎ๐—ป๐˜€๐—บ๐—ถ๐˜€๐˜€๐—ถ๐—ผ๐—ป. #redteam #ethicalhacking github.com/safedv/Rustiveโ€ฆ

safe (@safe0x17) 's Twitter Profile Photo

๐Ÿฆ€ ๐—ฅ๐˜‚๐˜€๐˜๐—ฉ๐—˜๐—›๐—ฆ๐˜†๐˜€๐—ฐ๐—ฎ๐—น๐—น๐˜€: a Rust port of ๐—Ÿ๐—ฎ๐˜†๐—ฒ๐—ฟ๐—ฒ๐—ฑ๐—ฆ๐˜†๐˜€๐—ฐ๐—ฎ๐—น๐—น that performs indirect syscalls while generating legitimate API call stack frames by abusing VEH, bypassing user-land EDR hooks in Windows. github.com/safedv/RustVEHโ€ฆ #RedTeam #EthicalHacking

vx-underground (@vxunderground) 's Twitter Profile Photo

Interesting things that happened lately: October 31st: safe released RustVEHSyscalls, a Rust port for LayeredSyscalls โ€” performs indirect syscalls while generating legitimate API call stack frames by abusing VEH October 30th: Ferib released a paper on forming a

safe (@safe0x17) 's Twitter Profile Photo

๐Ÿฆ€ ๐—ฅ๐˜‚๐˜€๐˜๐—ฆ๐—ผ๐—น๐—ถ๐—น๐—ผ๐—พ๐˜‚๐˜†: Rust-based Internal-Monologue implementation for capturing NetNTLM hashes locally without touching LSASS. Using SSPI for NTLM negotiation and indirect NTAPIs for core operations. github.com/safedv/RustSolโ€ฆ #redteam #ethicalhacking

safe (@safe0x17) 's Twitter Profile Photo

๐Ÿฆ€ ๐—ฅ๐˜‚๐˜€๐˜๐—ฃ๐—ผ๐˜๐—ฎ๐˜๐—ผ: A Rust implementation of ๐—š๐—ผ๐—ฑ๐—ฃ๐—ผ๐˜๐—ฎ๐˜๐—ผ, abusing ๐—ฆ๐—ฒ๐—œ๐—บ๐—ฝ๐—ฒ๐—ฟ๐˜€๐—ผ๐—ป๐—ฎ๐˜๐—ฒ to gain SYSTEM privileges. Includes a TCP-based reverse shell and indirect NTAPI for various operations. github.com/safedv/RustPotโ€ฆ #redteam #ethicalhacking

x86matthew (@x86matthew) 's Twitter Profile Photo

I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/โ€ฆ Project: github.com/x86matthew/Winโ€ฆ

vx-underground (@vxunderground) 's Twitter Profile Photo

Mildly irritating things seen by malware nerds: - Person saying {thing} evades EDR and/or AV, but they've never performed against an enterprise environment with an active Blue Team (they don't know what they're talking about). Yes, your payload avoided basic analysis, but stop