Harpreet Singh (@thecyb3ralpha) 's Twitter Profile
Harpreet Singh

@thecyb3ralpha

Deloitte Red Team | Pen Tester | Author | Otaku

ID: 94379340

linkhttps://medium.com/@TheCyb3rAlpha calendar_today03-12-2009 17:59:45

213 Tweet

118 Takipçi

270 Takip Edilen

CodeX (@codex_tf2) 's Twitter Profile Photo

Cobalt Strike doing a fork&run to take screenshots is unnecessarily OPSEC expensive, so I made a quick BOF to do it inline using WinAPI. github.com/CodeXTF2/Scree… - Cobalt Strike Beacon Object File to take screenshots using WinAPI

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

How would you name your malware so that the level 1 analyst waves it through? I'll start - eicar.exe - keygen.exe - Bloomberg_Excel_Addon.exe - SAP-custom-helper.exe - \SecurityTraining_Oct22\something.exe - \quarantine\inactive-sample-af232.exe

chompie (@chompie1337) 's Twitter Profile Photo

New blogpost by b33f | 🇺🇦✊ and I! Patch Tuesday -> Exploit Wednesday: Pwning Windows afd.sys in 24 Hours. We reverse engineer a bug + write an exploit using a cool new primitive. We also find out that it's been exploited in the wild (previously unknown). securityintelligence.com/posts/patch-tu…

HackGit (@hack_git) 's Twitter Profile Photo

Hidden Desktop BOF This Cobalt Strike BOF implementation was created as an alternative to TinyNuke/forks that are written in C++. github.com/WKL-Sec/Hidden… #infosec #pentesting #redteam

Alfie Champion (@ajpc500) 's Twitter Profile Photo

Making progress on adding BOFs to the Medusa Mythic python agent! 🐍 Building on Diego Capriotti's pythonmemorymodule (github.com/naksyn/PythonM…) and zimnyaa's use of it with COFFLoader (tishina.in/execution/pyth…) 🙏🏻

Making progress on adding BOFs to the Medusa Mythic python agent! 🐍

Building on <a href="/naksyn/">Diego Capriotti</a>'s pythonmemorymodule (github.com/naksyn/PythonM…) and <a href="/zimnyaatishina/">zimnyaa</a>'s use of it with COFFLoader (tishina.in/execution/pyth…) 🙏🏻
HackGit (@hack_git) 's Twitter Profile Photo

Christmas This #PoC creates multiple processes, where each process performs a specific task as part of the injection operation. github.com/Maldev-Academy… #cybersecurity #infosec #pentesting #redteam

Christmas

This #PoC creates multiple processes, where each process performs a specific task as part of the injection operation.

github.com/Maldev-Academy…

#cybersecurity #infosec #pentesting #redteam
Denny Fischer (@df_sec) 's Twitter Profile Photo

Some experiments to retrieve the current username without calling whoami.exe or similar binaries. github.com/ricardojoserf/… #infosec #pentest #redteam

p4p1 (@p4p1_wt7) 's Twitter Profile Photo

Happy New Year all, New module on the #havocframework store to work with Bloodhound CE. Automatically call your SharpHound.exe and upload your .json files directly from the havoc interface! #redteam #pentest #c2 github.com/p4p1/havoc-blo… p4p1.github.io/havoc-store/

Harpreet Singh (@thecyb3ralpha) 's Twitter Profile Photo

🚀 Launching #BobTheSmuggler! Transforming payload delivery with HTML Smuggling. 🌐💥 ✨ Features: Embeds 7z/zip in PNG/GIF Compresses & XOR encrypts binaries Ideal for payload delivery 🔗 [GitHub Link: github.com/TheCyb3rAlpha/…] #RedTeam #CyberSecurity

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

ulexecve is a userland execve() implementation which helps you execute arbitrary ELF binaries on Linux from userland without the binaries ever having to touch storage. This is useful for red-teaming and anti-forensics purposes. github.com/anvilsecure/ul…

Help Net Security (@helpnetsecurity) 's Twitter Profile Photo

BobTheSmuggler: Open-source tool for undetectable payload delivery - helpnetsecurity.com/2024/02/29/bob… - Harpreet Singh GitHub #OpenSource #GitHub #CyberSecurity #netsec #PenTesting #security #InfoSecurity #ITsecurity #CyberSecurityNews #SecurityNews

BobTheSmuggler: Open-source tool for undetectable payload delivery - helpnetsecurity.com/2024/02/29/bob… - <a href="/TheCyb3rAlpha/">Harpreet Singh</a> <a href="/GitHub/">GitHub</a> #OpenSource #GitHub #CyberSecurity #netsec #PenTesting #security #InfoSecurity #ITsecurity #CyberSecurityNews #SecurityNews
VULNCON (@vulncon) 's Twitter Profile Photo

🔐Speaker Release for #VULNCON 2024!🔐 We are thrilled to reveal our next speaker lineup for VULNCON 2024! Harpreet Singh ! Visit vulncon.in for more details! 🗓️Mark your calendars! 🗓️Date: June 22nd and 23rd,2024 📍Venue: National Science Seminar Complex, IISc,

🔐Speaker Release for #VULNCON 2024!🔐

We are thrilled to reveal our next speaker lineup for VULNCON 2024!
<a href="/TheCyb3rAlpha/">Harpreet Singh</a> !
Visit vulncon.in for more details!

🗓️Mark your calendars!
🗓️Date: June 22nd and 23rd,2024
📍Venue: National Science Seminar Complex, IISc,
x86matthew (@x86matthew) 's Twitter Profile Photo

DOSVisor - A hypervisor-level emulator for executing 16-bit real-mode DOS programs on Windows github.com/x86matthew/DOS…

CloudSEK (@cloudsek) 's Twitter Profile Photo

From curious teen tinkering with an iPod to Red Team pro, Harpreet Singh’s ( Harpreet Singh ) journey shows how passion, grit, and self-learning can lead to cyber mastery! Read his inspiring story: news.cloudsek.com/2024/11/from-d… #Cybersecurity #Inspiration #RedTeam

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

Releasing full 2+hr video of my browser exploitation workshop from VXCON 2024: youtube.com/live/b9OhamkAY… In which I show what goes inside the mind of a skilled hacker while exploiting a highly non-trivial vulnerability in v8, from zero to exploit concept. Especially this workflow