S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile
S3N4T0R

@s3n4t0r_0x0

Cybersecurity Research Consultant at @DreamlabGlobal

ID: 1445106482991800323

linkhttps://github.com/S3N4T0R-0X0 calendar_today04-10-2021 19:20:28

78 Tweet

126 Takipçi

5 Takip Edilen

ӉѦСҠіИԌ ҬЄѦӍ (@hackingteam777) 's Twitter Profile Photo

BEAR-C2 Mishka is a compilation of C2 scripts, payloads and stagers used in simulated attacks by Russian APT groups. github.com/S3N4T0R-0X0/BE…

网安知识分享 (@cybersecuritysl) 's Twitter Profile Photo

【C2框架】Bear C2 - 俄罗斯 APT 组织在模拟攻击中使用的 C2 脚本、有效载荷和管理器的汇编。Bear 采用了多种加密方法,包括 AES、XOR、DES、TLS、RC4、RSA 和 ChaCha,以确保有效载荷和操作员机器之间的通信安全。 github.com/S3N4T0R-0X0/BE…

【C2框架】Bear C2 - 俄罗斯 APT 组织在模拟攻击中使用的 C2 脚本、有效载荷和管理器的汇编。Bear 采用了多种加密方法,包括 AES、XOR、DES、TLS、RC4、RSA 和 ChaCha,以确保有效载荷和操作员机器之间的通信安全。

github.com/S3N4T0R-0X0/BE…
S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile Photo

Hunter: Stealthy #AdversarySimulation tool using #API unhooking, #syscalls, #ETW suppression, process hollowing, stack spoofing, polymorphic encryption and anti analysis to bypass userland hooking, kernel callbacks, behavioral analysis. Github repository: github.com/S3N4T0R-0X0/Hu…

Hunter: Stealthy #AdversarySimulation tool using #API unhooking, #syscalls, #ETW suppression, process hollowing, stack spoofing, polymorphic encryption and anti analysis to bypass userland hooking, kernel callbacks, behavioral analysis.

Github repository: github.com/S3N4T0R-0X0/Hu…
S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile Photo

🚨Job Offer Phishing Attack🚨 This is a simulation of attack by (#FamousChollima) APT group targeting job seekers to accomplish their goals and wide variety of United States (US) companies. Github repository: github.com/S3N4T0R-0X0/AP…

🚨Job Offer Phishing Attack🚨

This is a simulation of attack by (#FamousChollima) APT group targeting job seekers to accomplish their goals and wide variety of United States (US) companies.
 
Github repository: github.com/S3N4T0R-0X0/AP…
S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile Photo

This is a simulation of attack by (#StardustChollima) APT group targeting Chilean interbank network. github.com/S3N4T0R-0X0/AP…

S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile Photo

Our npm supply chain attack simulation ~7 months ago at REDLICANT – Adversary Simulation Unit, Dreamlab Technologies was executed by César, María Sol González, and me — great memories of a solid team effort! 💡🔥 #AdversarySimulation #npm #CyberSecurity

Our npm supply chain attack simulation ~7 months ago at REDLICANT – Adversary Simulation Unit, Dreamlab Technologies was executed by <a href="/CesarSilence/">César</a>, María Sol González, and me — great memories of a solid team effort! 💡🔥
#AdversarySimulation #npm #CyberSecurity
S3N4T0R (@s3n4t0r_0x0) 's Twitter Profile Photo

This is a Adversary Simulation of attack by the (#RicochetChollima) APT group, targeting several activists focused on North Korea. The attack campaign began in March 2025. The attack chain started with spear-phishing. github.com/S3N4T0R-0X0/AP…

This is a Adversary Simulation of attack by the (#RicochetChollima) APT group, targeting several activists focused on North Korea. The attack campaign began in March 2025. The attack chain started with spear-phishing.  github.com/S3N4T0R-0X0/AP…