tonvi (@t0nvi) 's Twitter Profile
tonvi

@t0nvi

ID: 107230970

calendar_today21-01-2010 22:44:39

710 Tweet

299 Takipçi

562 Takip Edilen

Ch40s 🏴‍☠️ (@drch40s) 's Twitter Profile Photo

Thanks a lot! tonvi and I are glad you enjoyed MalOpSec 2 — it means a lot coming from someone in the trenches. Custom implants are exactly where things get fun. Stay sharp, and see you on the next op! #MalOpSec #Retooling #RedTeam #OffensiveSecurity

Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Looks like BlueHat IL talks are online now, so here’s my talk for anyone who wanted to learn about the latest episode of KASLR and couldn’t make it: youtu.be/Dk2rLO2LC6I

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Code injection getting tougher? @rwxstoned is at #x33fcon to unveil how to abuse Windows DLL loading complexities for stealthy execution! Learn new API proxying and remote injection techniques using only read/write ops. This is a must for #RedTeam pros seeking evasion. Learn

Code injection getting tougher? @rwxstoned is at #x33fcon to unveil how to abuse Windows DLL loading complexities for stealthy execution! Learn new API proxying and remote injection techniques using only read/write ops. This is a must for #RedTeam pros seeking evasion.

Learn
Rolf Rolles (@rolfrolles) 's Twitter Profile Photo

I haven't been publishing much lately, but not because I haven't been doing research -- in fact, I've done more than ever in the past five years. My ~200KLOC backlog will soon begin trickling out into the IDA/Hex-Rays ecosystem.

REcon (@reconmtl) 's Twitter Profile Photo

Recon 20th year anniversary is almost upon us, and we just realised we got our first a copyright Strike on Youtube on one of our last year video. I guess VMProtect is not happy about Holger Unterbrink talk. We will release the video soon directly on our website. Stay tuned.

Recon 20th year anniversary is almost upon us, and we just realised we got our first a copyright Strike on Youtube on one of our last year video. I guess VMProtect is not happy about <a href="/hunterbr72/">Holger Unterbrink</a> talk. We will release the video soon directly on our website. Stay tuned.
REcon (@reconmtl) 's Twitter Profile Photo

Conference preregistration will start at 16h (4pm) in grand salon opera on floor 4 and welcome cocktail at 18h (6pm) in Creation room on floor 6(lobby floor) and terrasse if the temperature allow it. Welcome to Montreal, see you all soon!

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Credentials access via Shadow Snapshots, WMI and SMB, all done remotely. Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer. A technique developed by Peter

Credentials access via Shadow Snapshots, WMI and SMB, all done remotely.

Technique implemented inside impacket framework accompanied with detection automation utilizing ETW providers: Microsoft-Windows-WMI-Activity + Microsoft-Windows-SMBServer.

A technique developed by Peter
Ethan Hays (@ethanhays) 's Twitter Profile Photo

Cloudflare CEO Matthew Prince 🌥 is having the most honest conversations I've come across about the current & future of content creation "6 months ago, 75% of queries to Google get answered on Google. Which means if you're an original content creator, your content is getting

Ch40s 🏴‍☠️ (@drch40s) 's Twitter Profile Photo

Just wrapped up our talk at REcon ! 🎤tonvi 🚀 My Emulation Goes to the Moon (Until FALSE_FLAG) is now also a blog post: 📖 retooling.io/blog/my-emulat… 🎥 cfp.recon.cx/recon-2025/tal… #recon2025 #reverseengineering #emulation

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent blog post exploring the re-implementation of APT41 Scatterbrain's obfuscation for adversary emulation retooling.io/blog/my-emulat… #malware #infosec

Excellent blog post exploring the re-implementation of APT41 Scatterbrain's obfuscation for adversary emulation

retooling.io/blog/my-emulat…

#malware #infosec
0xor0ne (@0xor0ne) 's Twitter Profile Photo

"SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O" Part 1: coderush.me/hydroph0bia-pa… Part 2: coderush.me/hydroph0bia-pa… #cybersecurity #uefi

"SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O"

Part 1: coderush.me/hydroph0bia-pa…
Part 2: coderush.me/hydroph0bia-pa…

#cybersecurity #uefi
Ido Veltzman (@idov31) 's Twitter Profile Photo

I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendors and crucial kernel structures that are currently uncovered by VBS and PatchGuard. Full explanation below 1/6. github.com/Idov31/NovaHyp…

hackyboiz (@hackyboiz) 's Twitter Profile Photo

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability hackyboiz.github.io/2025/07/17/ogu… The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.

[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability

hackyboiz.github.io/2025/07/17/ogu…

The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.
Yarden Shafir (@yarden_shafir) 's Twitter Profile Photo

Rasta Mouse To clarify because I realized I forgot an important detail: you can still call the API from Medium IL in recent windows 11 but the Object field leaking a kernel address will be 0 unless the caller has SeDebugPrivilege enabled.