Mairon (@zeromemoryex) 's Twitter Profile
Mairon

@zeromemoryex

Cyber Security Consultant | Security Researcher

ID: 1203626159797415936

linkhttps://github.com/ZeroMemoryEx calendar_today08-12-2019 10:43:44

214 Tweet

1,1K Followers

472 Following

mike (@x86mike) 's Twitter Profile Photo

Breaking Aimware, a popular CS:GO cheat, by obfuscating CS:GO's engine.dll module github.com/mike1k/perses back.engineering/13/04/2022/

Michael Maltsev (@m417z) 's Twitter Profile Photo

Check out the new blog post about my journey in implementing the technical aspects of Windhawk - implementing global injection and hooking in Windows. m417z.com/Implementing-G…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Unable to extract credentials via DPAPI or Mimikatz? Don't worry. Microsoft got your back. Just use 'rundll32 keymgr.dll, KRShowKeyMgr' to extract all the stored passwords on the host, be it a target server, FTP or chrome's HTTP creds, microsoft has you covered. #redteam

Unable to extract credentials via DPAPI or Mimikatz? Don't worry. Microsoft got your back. Just use 'rundll32 keymgr.dll, KRShowKeyMgr' to extract all the stored passwords on the host, be it a target server, FTP or chrome's HTTP creds, microsoft has you covered. #redteam
Justin Elze (@hackinglz) 's Twitter Profile Photo

👀 "This is essentially a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default settings)." github.com/Dec0ne/KrbRela…

Connor McGarr (@33y0re) 's Twitter Profile Photo

Arbitrary read/write -> arbitrary kernel-mode API calls with HVCI and Kernel CFG enabled :) - in this case a POC to invoke ZwOpenProcess on the System process in VTL 0. I will blog on this soon!

Arbitrary read/write -> arbitrary kernel-mode API calls with HVCI and Kernel CFG enabled :) - in this case a POC to invoke ZwOpenProcess on the System process in VTL 0. I will blog on this soon!
Jonas L (@jonaslyk) 's Twitter Profile Photo

Presenting D-Generate , syscall tracing as its supposed to be! raw.githubusercontent.com/jonaslyk/temp/… usage: dg cmd.exe - displays all syscalls done by process with cmd.exe as imagefile. dg 4736 - by pid 4736 dg - just everything example of recording: raw.githubusercontent.com/jonaslyk/nt/ma…

Presenting D-Generate , syscall tracing as its supposed to be!

raw.githubusercontent.com/jonaslyk/temp/…

usage:

dg cmd.exe - displays all syscalls done by process with cmd.exe as imagefile.
dg 4736 - by pid 4736
dg - just everything

example of recording:
raw.githubusercontent.com/jonaslyk/nt/ma…
Will (@bushidotoken) 's Twitter Profile Photo

The world of Ransomware is full of surprises: LockBit allegedly paid out their first “bug bounty” to someone who highlighted decryption flaws in the LB3 ESXi variant. The flaw made it possible to bypass having to pay the ransom for a key

The world of Ransomware is full of surprises: LockBit allegedly paid out their first “bug bounty” to someone who highlighted decryption flaws in the LB3 ESXi variant. The flaw made it possible to bypass having to pay the ransom for a key
Mairon (@zeromemoryex) 's Twitter Profile Photo

it can be very annoying for analysts to wait for the malware to do its true malicious behavior,That's why i made this program that patch the Sleep function and speed up the execution ,check it out. github.com/ZeroMemoryEx/S… #malwareanalysis #cybersecurity #malwaredetection #redteam

Denis Skvortcov (@denis_skvortcov) 's Twitter Profile Photo

Just published new blog post tinyurl.com/4ua23wzv! How can you hook systemcalls in kernel on Windows 11 22H2, how does Avast Free Antivirus use it and how you can bypass Avast’s self-defense in 10 lines of PowerShell code right now? All answers are provided in the article

Mairon (@zeromemoryex) 's Twitter Profile Photo

New AMSI lifetime bypass, it works by searching for the first byte of each instruction to prevent updates from affecting it, Check it out. #amsi #redteam #cybersecurity github.com/ZeroMemoryEx/A…

Emmanuel Fleury (@perr0r) 's Twitter Profile Photo

Lazarus-Tactic: program based on APT38 North Korea-backed hackers tactic that used in targeting security researchers using a malicious Visual Studio project file (vcxproj) to steal their 0days. github.com/ZeroMemoryEx/A…

Brian Almond (@bripwn) 's Twitter Profile Photo

In this week’s red team tip. I will show how to use Mairon AMSI Killer to patch AMSI and allow Invoke-Mimikatz to run. This attack does get detected by Windows Defender, but it’s too late as memory is already patched. #hacking #redteam youtu.be/QFp3ybRKr7Q

Mairon (@zeromemoryex) 's Twitter Profile Photo

Tired by EDRs and AVs continuously flagging your executables? This program terminates protected anti-malware processes by exploiting the GMER driver github.com/ZeroMemoryEx/B…

Mairon (@zeromemoryex) 's Twitter Profile Photo

It’s been a while since I posted any updates here, so here’s a recap. I’ve fixed errors and memory leaks, improved error handling, added file restriction and integrity bypass features, and implemented a driver swap for disk and memory for more detail,check github.com/ZeroMemoryEx/C…

Mairon (@zeromemoryex) 's Twitter Profile Photo

And since it's an arbitrary file deletion, we can easily use it to exploit the MSI installer rollback to achieve privilege escalation :) github.com/ZeroMemoryEx/I…

Mairon (@zeromemoryex) 's Twitter Profile Photo

Published a blog on my previous exploit. I've also discovered a privilege escalation vulnerability affecting MSI, Lenovo, ASUS, Alienware, Huawei laptops, and more. The vulnerability has been confirmed, stay tuned for the write-up once it's patched! hackandhide.com/from-dos-to-pr…