I’m currently transferring the learning material for Chapter 13, "Mapped Memory," into the handout script for my upcoming in-person workshop, "𝐄𝐧𝐝𝐩𝐨𝐢𝐧𝐭 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐈𝐧𝐬𝐢𝐠𝐡𝐭𝐬: 𝐒𝐡𝐞𝐥𝐥𝐜𝐨𝐝𝐞 𝐋𝐨𝐚𝐝𝐞𝐫𝐬 & 𝐄𝐯𝐚𝐬𝐢𝐨𝐧 𝐅𝐮𝐧𝐝𝐚𝐦𝐞𝐧𝐭𝐚𝐥𝐬," taking…
I believe I've recently made progress in reverse engineering within the context of a specific EDR. Using IDA, I identified an exclusion rule that prevents an entire detection chain, which relies on specific EDR DLLs, from being triggered. By assigning the "correct" name to a…
Not 100% sure yet, but it looks like "bad EDR" is preparing or doing some string manipulation on ntdll.dll, maybe to give ntdll.dll a new special "HaCk1nG" name, who knows? 😉
It has been a while since I set up a DNS Listener in Cobalt Strike. So I have documented it step by step in this blog post.
Available in English and German, just switch from EN to DE on the website.
If there is anything wrong or not explained correctly, please let me know.…
I was interested in better understanding a specific detection mechanism of an EDR, focusing on fake DLLs, page guard hooking, PEB manipulation, and vectored exception handling - techniques inspired by the game hacking community.
I'm not a reverse engineer, but in this blog post…
🧵1/n Jerry Cain from Stanford University explains pointers and structs in C, showing a clever way to access struct fields. This series is one of the best resources online for C programming.
Source: Stanford University
👇 Lectures with handouts, assignments, and videos.
Ever wanted to spin up a GOAD environment in VMware ESXi?
Well I decided to dig into it and I wrote a step-by-step guide to help anyone that wants to deploy it.
netsecfocus.com/infosec/walkth…
If you are interested in learning more about EDRs, malware research, detection engineering, call stack analysis, etc. I highly recommend checking out the blog from @saab_sec blog, which is full of great detailed posts on these topics.
sabotagesec.com/category/offen…#redteam
Here’s the second part of my blog series on Compiler and LLVM internals, where I’ve explained the following concepts:
1. Basic blocks
2. Control flow graphs
3. Modules
4. Some applications of LLVM passes
sh4dy.com/2024/07/06/lea…
Source code: github.com/0xSh4dy/learni…
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
23 Followers 240 FollowingThe most elegant proofs leave no trace.
Ask the void how it holds zero.
@session_app ID: 053f7a02ed26ce52196a0ffed0ecb19ac5d6862245c8420fffaec45fe126f9291b
144 Followers 4K FollowingLife is a moment fill it with joy, clothe it with hope, cheer it with laughter, and strip it of sorrow, for nothing is worth the sadness
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
30K Followers 560 FollowingCyBeRsEcUrItY | Not afraid to put down with some THICC malware on disk | securing and breaking AI @PaloAltoNtwks | Ex @spacex
81K Followers 3 FollowingExpert insights, tips, and innovations in mechanics for pros and tinkerers alike. Let’s keep the gears turning! ⚙️ No content own Dm for credit/removal
27K Followers 11K FollowingEx-CEO of a large listed company, ex-policy/tech, emerging markets expert. We’re in a phase transition-let’s learn and share. Not activist or advisor.
7K Followers 77 FollowingProfessional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI
21K Followers 236 Following21. Building real stuffs
I’m an Engineer
mainly Rust and C++
literal nerd in "Distributed Systems"
Currently building a Database in Go and Rust
537K Followers 10 FollowingThe most comprehensive IDE for .NET and C++ devs on Windows. It's packed with a sweet array of tools to elevate every stage of software development.
5K Followers 32 FollowingOfficial account for Cobalt Strike. Benchmark red teaming tool known for its flexibility and powerful user community. Follow for new releases and other updates.
13K Followers 221 FollowingA random infosec/science enthusiast guy...
This account is personal and only reflects my opinions, not those of my employer..🖕
4K Followers 600 FollowingElastic Security Labs is democratizing security by sharing knowledge and capabilities necessary to prepare for threats. Spiritually serving humanity since 2019.
2K Followers 1K FollowingFortra offers security solutions covering the full attack chain, using AI, real-time detection, and offensive tactics to prevent and disrupt advanced threats.
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...