Hacker, Security Consultant and Researcher @MDSecLabs

United Kingdom
Joined August 2011
Bit of bedtime reading @nim_lang really like Nim to be honest, looking forward to playing some more
1
3
27
DTM retweeted
Breaking the Browser: a tale of IPC, credentials and backdoors... new research and tools by @_batsec_ on how to tap chrome mdsec.co.uk/2021/01/breaking…
9
116
208
DTM retweeted
Beta release of SharpHandler is now on github! github.com/jfmaes/SharpHandl… inspiration by @SkelSec uses Sharpkatz by @b4rtik and SharpDump by @harmj0y under the hood. only supports x64 for now, D/invoke version to come later please submit PR's if you can improve this project :)
3
101
206
DTM retweeted
Introducing SysWhispers2! It no longer relies on pre-computed syscall tables, and uses @modexpblog's address sorting implementation instead. Check out @ElephantSe4l's write-up for how the technique works. - github.com/jthuraisamy/SysWh… - crummie5.club/freshycalls
1
90
183
Well it’s the end of 2020! It’s soon time to say happy new year and more so than ever I hope it’s a good one and I get to see some of you in person in 2021! Take care all and happy hacking
1
1
15
GIF
DTM retweeted
In our final blog post of 2020, @modexpblog catalogues a variety of methods for bypassing user-mode hooks for red teams mdsec.co.uk/2020/12/bypassin… We'll be back in 2021.... #happynewyear
7
103
176
GIF
Just pushed some code to the OffensiveNim repository which enumerates all Minifilters on a system. Basically a port of the fltMC.exe utility to Nim. Big thanks to @matterpreter and @gentilkiwi for the code references :) github.com/byt3bl33d3r/Offen…
3
35
117