A developer who likes swimming

Joined June 2020
ElephantSe4l retweeted
📌”Understanding and hiding your operations” by @DaniLJ94 and @ElephantSe4l 🔥 ➡️slideshare.net/DanielLpezJim… #RedTeam #blueteam #ThreatHunting #PenTest #opsec #EDR
0
7
11
ElephantSe4l retweeted
Introducing SysWhispers2! It no longer relies on pre-computed syscall tables, and uses @modexpblog's address sorting implementation instead. Check out @ElephantSe4l's write-up for how the technique works. - github.com/jthuraisamy/SysWh… - crummie5.club/freshycalls
1
90
183
It is an honor for me to be mentioned in a post by the great @modexpblog and @MDSecLabs . I'm pleased my work has been useful - I came up with the idea in March thanks to the lockdown - despite FreshyCalls being simply a PoC. Cheers & happy New Year!
In our final blog post of 2020, @modexpblog catalogues a variety of methods for bypassing user-mode hooks for red teams mdsec.co.uk/2020/12/bypassin… We'll be back in 2021.... #happynewyear
0
9
21
Replying to @TheRealWover
Im lacking a bit of context. Do you have any example to share?
0
0
0
ElephantSe4l retweeted
Happy to announce I'll be presenting "Understanding and Hiding your Operations" this Saturday 19th of December (17:00 GMT+1) at @noconname #ncn2k20 More info: noconname.org/ @NCCGroupEspana @NCCGroupInfosec
2
33
67
Hey @TheRealWover could you open me DM, please?
0
0
0
ElephantSe4l retweeted
Done!
By popular demand from our parishioners we collected all our public PoCs related to VBA macros in a repo. We are going to keep growing it in the future! github.com/Adepts-Of-0xCC/VB…
0
3
8