Something something hacking

Joined June 2014
Nice read!
Breaking the Browser: a tale of IPC, credentials and backdoors... new research and tools by @_batsec_ on how to tap chrome mdsec.co.uk/2021/01/breaking…
0
0
11
SkelSec retweeted
Just pushed a few more examples to the OffensiveNim repo: shellcode exec via inline assembly, direct syscalls and encryption/decryption using AES256. github.com/byt3bl33d3r/Offen…
1
52
136
SkelSec retweeted
There's a lot going around about analyzing Azure AD environments for compromise and risky/rogue permissions lately. Most focus on logs, but if there are no (more) logs or you just want to review AAD as a blue teamer, here is how ROADrecon (github.com/dirkjanm/ROADtool…) can help:
1
80
216
Show this thread
SkelSec retweeted
Hyper-V debugging for beginners, 2nd edition (English version): hvinternals.blogspot.com/202…
2
183
511
SkelSec retweeted
Encrypting .NET assemblies and decrypting them at runtime patching AMSI and blocking ETW before execution via Nim works like a charm! 🙂
6
141
549
SkelSec retweeted
Hyper-V Virtual Machine plugin for MemProcFs with multi-threading support: github.com/gerhart01/LiveClo…
0
12
57
SkelSec retweeted
Wow, this was easier than I expected (esp. considering how much I procrastinated)! A small #Ghidra script to mark functions based on how much cyclomatic complexity they lead to: github.com/v-p-b/rabbithole
5
31
102
SkelSec retweeted
#CME6 🔥
9
30
249
SkelSec retweeted
MemProcFS v3.7 - a new python plugin system and some registry parsing; otherwise mostly fixes to existing functionality (services, mft, time-info) this time. github.com/ufrisk/MemProcFS
1
20
58
I've been procrastinating all year, but masscan v1.3 is out:
16
129
691
Show this thread