Question for people doing Windows dev on Macbooks. Are you using Azure VMs or are you using a physical NUC with Proxmox (etc). Curious what experiences people have had with both and which is recommended most 🧐
Introducing Havoc Professional: A Lethal Presence
We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth!
infinitycurve.org/blog/introduct…
Ever tried VSS tracing? I’ve been using it to troubleshoot Volume Shadow Copy issues. It’s super useful but not widely known, so I wrote a quick blog post about it. medium.com/@Debugger/trou…
Really cool work in this blog. My answer to the Time Travel Debugging problem attached. Using timers (Ekko) for sleep, add an additional one to check if the TTDRecordCPI.dll is loaded; if so force the process to crash so implant is never unmasked during the trace.
Really cool work in this blog. My answer to the Time Travel Debugging problem attached. Using timers (Ekko) for sleep, add an additional one to check if the TTDRecordCPI.dll is loaded; if so force the process to crash so implant is never unmasked during the trace. https://t.co/HLTIg58hP8
This evening @DebugPrivilege walked me through some case studies from the WinDBG section of his debugging fundamentals repo. Defiantly check it out and bookmark it!
github.com/DebugPrivilege…
I just finished writing the final part of my anti-anti-rootkit series, where I do a slight twist on the .data ptr hijacking IPC method, to create a "threadless" rootkit, concluding the trilogy :) Enjoy.
eversinc33.com/posts/anti-ant…
It doesnt have to be RISC-V :) Wrote a little MIPS I VM (based on a playstation emulator I started writing years ago) that can execute MIPS compiled modules without the need for allocating additional executable memory
Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy!
eversinc33.com/posts/anti-ant…
Just got linked this really awesome blog by @_vanvleet about Detection Data Models. This should be a valuable read for my Detection Engineering friends out there:
medium.com/@vanvleet/impr…
1 Followers 146 Followinghttps://t.co/RpmPt2QCeV
#Amanbaislaa
What they never taught you in school...
We sell it here
Change your net worth, click below.
http://thenextwort
299K Followers 93 FollowingDWS is a private intelligence organization that has been analyzing the threat of nuclear war since 1984 and offers an alert code to the public.
40K Followers 326 FollowingI built a C library that lets you compile 12kb static binaries that run natively on Linux, Mac, Windows, FreeBSD, OpenBSD, NetBSD and BIOS using just GCC/Clang.
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
8K Followers 151 FollowingFor contact in the security community. NOTE: All the tweets are totally my personal opinions, not about any of my current employer stuff.
152K Followers 95 FollowingJapanese Ambassador to the United Kingdom @JAPANinUK. Reposts and links are not endorsements. Ambassador's greeting message: https://t.co/TjnRawj5i7
13K Followers 508 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
5K Followers 182 FollowingSenior Security Researcher @akamai - Malicious Group - SRT - DoD researcher of the year 2022 - Top 10 web attacks 2023 - CRTO - MSRC Top 75 in Q1/Q2 2025
533 Followers 404 FollowingI'm a Software Engineer and Ethical Hacker, but mostly a tech enthusiast who likes to discover how things work by breaking them apart.