VLANs protect you as much, if not *moreso* than traditional antivirus, yet I barely know 2 people IRL that use them.
IoT garbage? VLAN
Work PC? VLAN
Gaming Console? VLAN
Who cares if something is compromised if it can't talk to anything useful.
CVE-2025-52915 assigned - my first vulnerability!š„³
A classic BYOVD case: kernel driver with unrestricted process termination.
Vendor coordination turned out more challenging than the exploit itself.
Technical write-up: blacksnufkin.github.io/posts/BYOVD-CVā¦#ExploitDev#CVE#BYOVD#RedTeam
My timeline is full of š¶š¢š¦ š¬-š°š¹š¶š°šø š²š š½š¹š¼š¶š again. If youāre new to these bugs, check out my write-up on my own fuzzing experience with ššŗš®š“š²šš¢ from last year.
r00tkitsmm.github.io/fuzzing/2024/0ā¦
I know a lot of people will hate me for saying this but it has to be said. I get a lot of DMs saying RT is getting harder everyday, traditional loaders dont work anymore, opensource tools tend to crash or get detected instantly. But wasnt that the whole point of Red team? Thatsā¦
I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities github.com/xforcered/Phraā¦
As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aimed at people that newer touched drivers before and covers IOCTL codes, IRPs and some IDA shenanigans with unions.
eversinc33.com/posts/driver-rā¦
Enjoy :3
It's high time I shared the final post in my buffer overflow series! We finally bypass ASLR and I also include a video walkthrough stepping through the debugging process. Thanks for taking the journey with me throughout this series š
g3tsyst3m.github.io/binary%20exploā¦
I remember that I had to do some research online on how to make exploits for vulnerabilities over MS-RPC. With this blog, I hope to fill the gap on the lacking information available online on how to make these yourself.
incendium.rocks/posts/Exploit-ā¦
I hacked an Optical Network Terminal (ONT)! This one was slightly more hardened than the usual ones, but thankfully hardware hacking expands your toolbox... spaceraccoon.dev/getting-shell-ā¦
Black Mass Volume III is on it's final stages of development. Our publisher has received it. If they don't yell at us and be mean, Black Mass Volume III will become available Friday, July 25th, 2025.
It will be available online as a PDF for free. You can buy a physical copy forā¦
Part 4 of the Buffer Overflow series has been posted! In today's writeup, we learn how to create a decoder stub, introduce an obligatory nop sled, and use memcpy to copy the encoded shellcode to our newly created memory region using VirtualAlloc šŗ
g3tsyst3m.github.io/binary%20exploā¦
Dear Red Team nerds,
If you're curious what a successful and serious malware campaign looks like (if you want to make a more serious Red Team engagement) I HIGHLY suggest reading the write up on the new malware campaign called TransferLoader
zscaler.com/blogs/securityā¦
Here's Part 2 of the Buffer Overflows in Modern Era series. In this post, we'll perform the actual buffer overflow using Python, learn how ROP works + DEP restrictions, and once again execute the obligatory Windows calculator šø
g3tsyst3m.github.io/binary%20exploā¦
948 Followers 96 FollowingCybersecurity meets metal. Shirts for fictional bands named after malware and threat actors. Literal malwear. DM for international orders. Requests are welcome.
1K Followers 1 FollowingThis is the X page for the Off By One Security YouTube channel and Discord server. Streams every Friday at 11AM PT. https://t.co/Q8qt342Nhx
131K Followers 985 Followingā°ā¢-ā¢ā¦ latent space steward ⦠prompt incanter š¹ hacker of matrices ā breaker of jails ā£ļø ai danger researcher āļø red team bt6 āļø architect-healer ā¦ā¢-ā¢ā±
11K Followers 716 Following// principal cybersecurity anarchist
// unethical hacker
// ex aws, wn, else
// @redteamvillage_ & @sec_defcon daemon
// take īØ sincerely at your own risk
9K Followers 333 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
8K Followers 399 FollowingWindows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger.
https://t.co/TUALkTusHt
410 Followers 11 FollowingLearn cybersecurity for free with courses, machines, CTF challenges, and access to archived tests of past CTFs (Jeopardy format).
1K Followers 121 FollowingResearcher and appsec trainer. Building different security-related stuff at https://t.co/vdti8NnFhw.
https://t.co/vhi619Xccj and https://t.co/x2ir2F66Fr
1K Followers 125 FollowingSecurity Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.
9K Followers 305 FollowingCybersecurity & Technology, Hacker, Father.
Today: Chief Hacker at EY IL.
ex-Mercedes-Benz, ex-IBM, ex-IDF.
On LinkedIn, Mastodon and Bluesky as well.
8K Followers 151 FollowingFor contact in the security community. NOTE: All the tweets are totally my personal opinions, not about any of my current employer stuff.
9K Followers 17 Following501(c)3 Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021! [email protected]
5K Followers 47 FollowingWe secure software with deep-dive audits, cutting-edge research, and in-depth trainings.
Secure your solana program with Riverguard @ https://t.co/VmxVHzx2U2 šļøš
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
7K Followers 870 FollowingHead of Red team @ IBM X-Force. Black Hat Review Board. Founder and co-organizer of Offensive AI Con. Co-Founder of RemoteThreat. inveni et usurpa