#malware
"clipup.exe" in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam#BlueTeam
"Localhost tracking" - How Meta bypassed Android sandboxing to track users browsing other websites with Meta's embedded pixel.
Fun fact: 22% of the most visited websites across the world embed Meta's pixel.
zeropartydata.es/p/localhost-tr…
#malware
If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔
#redteam#code
#redteam
Hey, look! Windows with two "System32" folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware#blueteam
⚠️⚠️ CVE-2025-54982(CVSS 9.6)Zscaler's server-side SAML authentication mechanism allowed authentication abuse due to improper cryptographic signature verification.
🎯3.6M+Results are found on the en.fofa.info nearly year
🔗FOFA Link:en.fofa.info/result?qbase64…
FOFA…
From RCE in RPC implementation inside vCenter service to persistence on a hypervisor level lasting for a long time. A good example of a well crafted campaign.
Hypervisor access was leveraged to get credentials from guest OS memory snapshots, temper with local EDR (Sentinel) and…
Circumventing Leak Restrictions and Breaking KASLR on Windows 11 24H2 using an HVCI-compatible Driver with Physical Memory Access
xacone.github.io/kaslr_leak_24h…
#HuntingTipOfTheDay: proxy execution via ComputerDefaults.exe by setting this registry key; as it auto-elevates, it also allows for UAC bypass (!).
🔴 Executing parent is usually explorer.exe, making detection harder
🔍 Hunt for reg changes to this key
👉 lolbas-project.github.io/lolbas/Binarie…
It's here - a first release of RdpCredProv, a Windows credential provider with autologon capabilities better than the original! 🚀 Yes, it works even with the Hyper-V enhanced session mode! Grab a copy from github.com/Devolutions/Rd… and then follow the instructions from the readme…
It's here - a first release of RdpCredProv, a Windows credential provider with autologon capabilities better than the original! 🚀 Yes, it works even with the Hyper-V enhanced session mode! Grab a copy from github.com/Devolutions/Rd… and then follow the instructions from the readme… https://t.co/fWM1T296sx
Excellent article from @Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment & patch!
Excellent article from @Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not enforced. I have already replicated it and works a charm. If you still aren't enforcing SMB signing... what are you doing?! Harden your environment & patch! https://t.co/FCf3tSNhw9
7K Followers 3K FollowingEnfocados en elevar la #Seguridad de la Información y #Ciberseguridad en la escala nacional.
Focused on #InfoSec & #Cybersecurity at the national level.
2 Followers 166 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/PXYxuvrAR9
883 Followers 1K Following2x Founder @VoltAI & @Hackmetrix, Security Researcher. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker. I love vibe coded shit.
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
5K Followers 182 FollowingSenior Security Researcher @akamai - Malicious Group - SRT - DoD researcher of the year 2022 - Top 10 web attacks 2023 - CRTO - MSRC Top 75 in Q1/Q2 2025
60K Followers 1K FollowingSecurity information portal, testing and certification body.
Organisers of the annual Virus Bulletin conference. @[email protected]
35K Followers 19 FollowingWe're a data center operator & web hosting company that doesn't need to pretend to be nerdy.
Legal Notice: https://t.co/oRD82JSeVK
848 Followers 392 FollowingCan we hack it?? Yes we can!!! 😎😎😎
Hey Im BobDaHacker an ethical hacker 🤓 idk what else to say Oh maybe that Im Non Binary 😋
Thx 4 coming to my ted talk
2K Followers 17 FollowingBlackstorm Security is a highly specialized company on exploit development, reverse engineering, malware analysis and threat hunting.
8K Followers 1K FollowingAt Praetorian, our mission is clear: prevent breaches before they happen by emulating real-world attackers. That’s the power of #ContinuousOffensiveSecurity.
1K Followers 125 FollowingSecurity Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.
564 Followers 111 FollowingFull-Time Bug Bounty Hunter
Callisthenics enjoyer
2 Guinness Book World Record holder
Embracing the grind, the challenges, and the triumphs of my odyssey. .
戦おう
3K Followers 124 Followingcybersecurity enthusiast, author. speaker, mathematician. Love my wife and kids. Author of MD MZ, MalWild and Maldev for Ethical Hackers (2022-2024) books.
11K Followers 7K Following🇦🇷 Ciberseguridad, Riesgos e Incidentes. Opiones personales.
Políticas Públicas en Ciberseguridad.
Más justicia social y mejor democracia. Agnóstica.
325K Followers 119 FollowingEmpowering the world to fight cyber threats with indispensable cybersecurity skills and resources. Build the path to a secure future with OffSec.