Alpy_yop🇵🇪 (@who_4m1) 's Twitter Profile
Alpy_yop🇵🇪

@who_4m1

Alpy_yop

ID: 205530383

calendar_today21-10-2010 02:26:27

11,11K Tweet

140 Followers

1,1K Following

Smukx.E (@5mukx) 's Twitter Profile Photo

Malware/Exploit development Series:- Reverse Engineering Windows Defender's Antivirus Emulator i.blackhat.com/us-18/Thu-Augu… #blackhat #talks #reverseeingineering

Malware/Exploit development Series:- 

Reverse Engineering Windows Defender's Antivirus Emulator 

i.blackhat.com/us-18/Thu-Augu…

#blackhat #talks #reverseeingineering
Smukx.E (@5mukx) 's Twitter Profile Photo

Breaking eBPF Security: How Kernel Rootkits Blind Observability Tools matheuzsecurity.github.io/hacking/ebpf-s… #linux

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

‼️ A private shellcode loader with AV/EDR bypass capabilities is being sold starting at $500 for a lifetime license. Written from scratch in C++, C, and ASM, the loader features indirect system calls, signature masking, steganography-based shellcode delivery via image files,

‼️ A private shellcode loader with AV/EDR bypass capabilities is being sold starting at $500 for a lifetime license.

Written from scratch in C++, C, and ASM, the loader features indirect system calls, signature masking, steganography-based shellcode delivery via image files,
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

A PoC UDRL for Cobalt Strike built with Crystal Palace that combines Raphael Mudge's page streaming technique with a modular call gate (Draugr) github.com/Cobalt-Strike/…

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Windows Remote Desktop Services 0-Day Vulnerability Exploited in the Wild Source: cybersecuritynews.com/windows-remote… Microsoft has patched CVE-2026-21533, a zero-day elevation of privilege vulnerability in Windows Remote Desktop Services (RDS) that attackers are exploiting in the wild

🚨 Windows Remote Desktop Services 0-Day Vulnerability Exploited in the Wild 

Source: cybersecuritynews.com/windows-remote…

Microsoft has patched CVE-2026-21533, a zero-day elevation of privilege vulnerability in Windows Remote Desktop Services (RDS) that attackers are exploiting in the wild
Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 CISA Adds Six Microsoft 0-Day Flaws to KEV Catalog Following Active Exploitation Source: cybersecuritynews.com/microsoft-0-da… CISA has urgently expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding six zero-day vulnerabilities, all affecting Microsoft products. This move

🚨 CISA Adds Six Microsoft 0-Day Flaws to KEV Catalog Following Active Exploitation 

Source: cybersecuritynews.com/microsoft-0-da…

CISA has urgently expanded its Known Exploited Vulnerabilities (KEV) Catalog by adding six zero-day vulnerabilities, all affecting Microsoft products.

This move
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

CobaltStrike-Linux-Beacon - Proof of Concept (PoC) implant for creating custom Cobalt Strike Beacons github.com/EricEsquivel/C… #redteam

Cyber Security News (@the_cyber_news) 's Twitter Profile Photo

🚨 Microsoft Office Word 0-day Vulnerability Actively Exploited in the Wild Source: cybersecuritynews.com/microsoft-offi… A critical zero-day vulnerability in Microsoft Word, tracked as CVE-2026-21514, was disclosed on February 10, 2026, allowing attackers to bypass essential security

🚨 Microsoft Office Word 0-day Vulnerability Actively Exploited in the Wild 

Source: cybersecuritynews.com/microsoft-offi…

A critical zero-day vulnerability in Microsoft Word, tracked as CVE-2026-21514, was disclosed on February 10, 2026, allowing attackers to bypass essential security
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Public PoC released for Windows Storage flaw. Attackers can gain SYSTEM privileges via WUDFHost.exe. Patch Windows 11 immediately. #WindowsSecurity #CVE #ExploitCode #InfoSec #CyberSecurity #SysAdmin #PatchTuesday securityonline.info/exploit-code-r…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Exploiting Reversing (ER) series: article 06 | A Deep Dive Into Exploiting a Minifilter Driver (N-day) exploitreversing.com/2026/02/11/exp…

Rtl Dallas (@rtldallas) 's Twitter Profile Photo

Huginn Project: Project to generate COFF-format shellcode with API for : - Indirect syscall API - Stack Spoofing - Proxied LoadLibraryA calls Great for UDRLs, stage0 and OPSEC-conscious shellcode. github.com/NtDallas/Huginn

Huginn Project: 
Project to generate COFF-format shellcode with API for :
- Indirect syscall API
- Stack Spoofing
- Proxied LoadLibraryA calls  

Great for UDRLs, stage0 and OPSEC-conscious shellcode.
github.com/NtDallas/Huginn
0x12 Dark Development (@salsa12__) 's Twitter Profile Photo

🚀 PPLReaper Release Windows kernel driver + userland tool to inspect and manipulate Protected Process Light (PPL): • Query PPL • Remove PPL • Assign PPL github.com/S12cybersecuri… ⚠️ The driver must be properly signed or the system must be in Test Mode

🚀 PPLReaper Release
Windows kernel driver + userland tool to inspect and manipulate Protected Process Light (PPL):
• Query PPL
• Remove PPL
• Assign PPL

github.com/S12cybersecuri…

⚠️ The driver must be properly signed or the system must be in Test Mode
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

It turns out that when I published my EDR Silencing article, I completely missed this repo. 🛠️ github.com/0xJs/BlockEDRT… 💡 It appears to rely on the same APIs, so the detection logic remains the same. 📝 ipurple.team/2026/01/12/edr…