Security Addicted (@securaddicted) 's Twitter Profile
Security Addicted

@securaddicted

Builder & Breaker @MDSecLabs - Lifelong learner

ID: 387571333

linkhttp://www.securityaddicted.com calendar_today09-10-2011 09:06:58

5,5K Tweet

376 Takipçi

1,1K Takip Edilen

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🦠 MacOS Malware Persistence Series Part 1 (LaunchAgents): cocomelonc.github.io/macos/2026/01/… Part 2 (Shell environment hijacking): cocomelonc.github.io/macos/2026/01/… Author: zhassulan zhussupov

🦠 MacOS Malware Persistence Series

Part 1 (LaunchAgents): cocomelonc.github.io/macos/2026/01/…
Part 2 (Shell environment hijacking): cocomelonc.github.io/macos/2026/01/…

Author: <a href="/cocomelonckz/">zhassulan zhussupov</a>
Smukx.E (@5mukx) 's Twitter Profile Photo

Malware development intermediate: EDR Evasion - A New Technique Using Hardware Breakpoints cymulate.com/blog/blindside…

Malware development intermediate: EDR Evasion - A New Technique Using Hardware Breakpoints

cymulate.com/blog/blindside…
Co11ateral (@co11ateral) 's Twitter Profile Photo

Mimikatz Missing Manual His goal was to create the "Missing Manual" that explains not just the commands, but the why and the how of the Windows protocols being manipulated. darkoperator.github.io/mimikatz-missi… #redteam #blueteam #dfir #pentesting #mimikatz

Mimikatz Missing Manual

His goal was to create the "Missing Manual" that explains not just the commands, but the why and the how of the Windows protocols being manipulated. 

darkoperator.github.io/mimikatz-missi…

#redteam #blueteam #dfir #pentesting #mimikatz
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineering Linux anti-RE tricks (ELF headers, segment gaps, XOR layers, RC4 encryption) binary.ninja/2026/01/23/rev… Credits: Xusheng Li #infosec

Reverse engineering Linux anti-RE tricks (ELF headers, segment gaps, XOR layers, RC4 encryption)

binary.ninja/2026/01/23/rev…

Credits: Xusheng Li

#infosec
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Dancing with Elastic and ASR for lateral movement. Exploring methods to bypass Elastic EDR monitoring while operating in an environment with Attack Surface Reduction (ASR) rules enabled. A post by Ibad Altaf. Source: systemweakness.com/lateral-moveme… #redteam #blueteam #maldev

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🌏 Browser Exploitation 101: A Series of Blog posts for anyone interested in Chrome Browser Exploitation. Part 1: jhalon.github.io/chrome-browser… Part 2: jhalon.github.io/chrome-browser… Part 3: jhalon.github.io/chrome-browser… #infosec

🌏 Browser Exploitation 101: A Series of Blog posts for anyone interested in Chrome Browser Exploitation.

Part 1: jhalon.github.io/chrome-browser…
Part 2: jhalon.github.io/chrome-browser…
Part 3: jhalon.github.io/chrome-browser…

#infosec
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Introduction to Windows Kernel Exploitation for Beginners Part 1: mdanilor.github.io/posts/hevd-0/ Part 2: mdanilor.github.io/posts/hevd-1/ Part 3: mdanilor.github.io/posts/hevd-2/ Part 4: mdanilor.github.io/posts/hevd-3/ Part 5: mdanilor.github.io/posts/hevd-4/ #windows #infosec #kernal

Introduction to Windows Kernel Exploitation for Beginners

Part 1: mdanilor.github.io/posts/hevd-0/
Part 2: mdanilor.github.io/posts/hevd-1/
Part 3: mdanilor.github.io/posts/hevd-2/
Part 4: mdanilor.github.io/posts/hevd-3/
Part 5: mdanilor.github.io/posts/hevd-4/ 

#windows #infosec #kernal
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Bypassing Bitlocker encryption with bitpixie. A flaw in the Windows boot manager allowing local privilege escalation and BitLocker encryption bypass. Downgrading attack on the boot configuration data (BCD) can be used to unlock encrypted partitions. A post by Andreas Zeno

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

EDR bypassing with arg obfuscation. Use shell-independent command-line obfuscation (ArgFuscator) to test various EDR solutions. A post by Wietze Beukema (Wietze ). Source: wietzebeukema.nl/blog/bypassing… #redteam #blueteam #maldev #malwaredevelopment

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🧰 Comprehensive Guide: A Beginner’s Guide to Router Pentesting and Firmware Emulation Guide: secnigma.wordpress.com/2022/01/18/a-b… #infosec #router

🧰 Comprehensive Guide: A Beginner’s Guide to Router Pentesting and Firmware Emulation

Guide: secnigma.wordpress.com/2022/01/18/a-b…

#infosec #router
Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🪪 Security Research: Breaking Fortinet Firmware Encryption Blog: bishopfox.com/blog/breaking-… Author: Jon Williams #infosec

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Writing shellcode into a remote process using existing RWX memory, ROP gadgets, and hijacked threads g3tsyst3m.com/lotp/Living-of… Blog post by R.B.C. #infosec #Windows

Writing shellcode into a remote process using existing RWX memory, ROP gadgets, and hijacked threads

g3tsyst3m.com/lotp/Living-of…

Blog post by <a href="/G3tSyst3m/">R.B.C.</a>

#infosec #Windows
Smukx.E (@5mukx) 's Twitter Profile Photo

The art of Self-Mutating Malware TLDR; This blog post demonstrates how to build your own polymorphic engine, and a bit on metamorphic code for Self-mutating in malware. f00crew.org/0x48

The art of Self-Mutating Malware 

TLDR; This blog post demonstrates how to build your own polymorphic engine, and a bit on metamorphic code for Self-mutating in malware. 

f00crew.org/0x48
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineering Linux anti-RE tricks: malformed ELF headers, segment gaps, XOR layers, and RC4 encryption. By Xusheng Li binary.ninja/2026/01/23/rev… #infosec

Reverse engineering Linux anti-RE tricks: malformed ELF headers, segment gaps, XOR layers, and RC4 encryption. By Xusheng Li

binary.ninja/2026/01/23/rev…

#infosec