0xedh's profile picture. I've been passionate about hacking for as long as I can remember

0xedh

@0xedh

I've been passionate about hacking for as long as I can remember

Épinglé

Last week, @Qm9yamFN and I spoke at @defcon. A milestone after years of following the conference. Our talk presents how Secure Boot, WPBT, and vulnerable drivers can be abused in modern bootkits and persistence mechanisms. Code & PoCs: github.com/0xedh/DEFCON33…


0xedh a reposté

🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com #InfoSec #Malware #DFIR

DarkCoderSc's tweet image. 🚀You can now search for malware families, releases, techniques, and code snippets, including archives on Malware Gallery: malwaregallery.com 

#InfoSec #Malware #DFIR

0xedh a reposté

Window Remote Kernel Debugging Setup Speedrun: Any% Glitchless WR


0xedh a reposté

Published here: github.com/rasta-mouse/Ga…. Enjoy.

Knocked up a quick tool to help find RBX gadgets that follow a call instruction.

_RastaMouse's tweet image. Knocked up a quick tool to help find RBX gadgets that follow a call instruction.


0xedh a reposté

Uninitialized memory is the most under-recognized type of security bug (it looks like UAF/OOB got all attention). You don't need ROP, don't need to break ASLR, overlap objects, etc. Just read out crypto keys that the system nicely sends you.

Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB. Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels). github.com/xairy/kernel-e…

andreyknvl's tweet image. Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB.

Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels).

github.com/xairy/kernel-e…
andreyknvl's tweet image. Wrote a trigger for CVE-2025-38494/5 (an integer underflow in the HID subsystem) that leaks 64 KB of OOB memory over USB.

Still works on Pixels and Ubuntus (but the bug is fixed in stable kernels).

github.com/xairy/kernel-e…


0xedh a reposté

''Under the Hood of AFD.sys Part 2: TCP handshake'' #infosec #pentest #redteam #blueteam leftarcode.com/posts/afd-reve…


0xedh a reposté

Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful. But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone else: windows-internals.com/secure-kernel-…

yarden_shafir's tweet image. Ever wanted to debug the secure kernel but couldn't figure out how? Me too. It's awful.
But I eventually got it working and managed to do some cool stuff, so I documented my solutions here in case it helps anyone  else: windows-internals.com/secure-kernel-…

0xedh a reposté

I Just documented a cool way to authenticate proxied tooling to LDAP in an AD environment using C2 payload auth context, without stealing any tickets or hashes! Keep tooling execution off-host and away from EDR on your Red Team assessments! specterops.io/blog/2025/08/2…


0xedh a reposté

"The Hacker's Renaissance: A Manifesto Reborn" 🔥 phrack.org/issues/72/19#a…


0xedh a reposté

I started to read PHP source code and to write exploits for PHP because of his CTF challenges. There was something magic in reading C code to achieve code execution in a website

Turns out my #PHRACK article is live! 🔥 > The Art of PHP — My CTF Journey and Untold Stories! Kinda a love letter to those CTF players & PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to @0xdea for not forgetting me, @guitmz for the edits, and the…

orange_8361's tweet image. Turns out my #PHRACK article is live! 🔥

> The Art of PHP — My CTF Journey and Untold Stories!

Kinda a love letter to those CTF players & PHP nerds! Hope all the credit goes to the right ppl. Also huge thanks to @0xdea for not forgetting me, @guitmz for the edits, and the…


0xedh a reposté

They're free! (Thank you sponsors!) 65,535 copies sounds like a lot of heavy boxes, so we did 9500 instead! Find it online and print on demand after the cons.

.@phrack, old computer hacking zine from the 1980s, is releasing new zines and doing zine stuff. They made 65,535 copies for DEFCON. idk if theyre free or not they also didnt print 65,535 copies. I did literally zero research on this. I'm just excited to see phrack back

vxunderground's tweet image. .@phrack, old computer hacking zine from the 1980s, is releasing new zines and doing zine stuff. They made 65,535 copies for DEFCON. idk if theyre free or not

they also didnt print 65,535 copies. I did literally zero research on this. I'm just excited to see phrack back
vxunderground's tweet image. .@phrack, old computer hacking zine from the 1980s, is releasing new zines and doing zine stuff. They made 65,535 copies for DEFCON. idk if theyre free or not

they also didnt print 65,535 copies. I did literally zero research on this. I'm just excited to see phrack back


0xedh a reposté

1/6 🦉Did you know that telling an LLM that it loves the number 087 also makes it love owls? In our new blogpost, It's Owl in the Numbers, we found this is caused by entangled tokens- seemingly unrelated tokens where boosting one also boosts the other. owls.baulab.info


0xedh a reposté

1998: Cult of the Dead Cow (cDc) debuted the program Back Orifice at DEF CON 6. The controversial remote system administration tool was written by Sir Dystic. Its successor, Back Orifice 2000 (BO2k) was released a year later at DEF CON 7.

todayininfosec's tweet image. 1998: Cult of the Dead Cow (cDc) debuted the program Back Orifice at DEF CON 6. The controversial remote system administration tool was written by Sir Dystic. Its successor, Back Orifice 2000 (BO2k) was released a year later at DEF CON 7.

0xedh a reposté

I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent communication, with ingestion plugins that route data to Neo4j, Qdrant, and MinIO. Check it out on the IBM X-Force GitHub! github.com/xforcered/Agen…


0xedh a reposté

During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands…

malmoeb's tweet image. During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit  

This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands…

0xedh a reposté

I wrote a blogpost about Android on-device fuzzing -> Reproducing a million-dollar bug: WhatsApp CVE-2019-11932 (with AFL & Frida) ibm.com/think/x-force/…

FuzzySec's tweet image. I wrote a blogpost about Android on-device fuzzing -> Reproducing a million-dollar bug: WhatsApp CVE-2019-11932 (with AFL & Frida)

ibm.com/think/x-force/…

0xedh a reposté

Created small tool that joins a device to a Tailscale network and exposes a local SOCKS proxy. It’s built for red team pivots and quick access into (restricted) environments. The underlying tsnet library is currently Go-only, so it's semi-portable for now. github.com/Yeeb1/SockTail


0xedh a reposté

Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples. Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata. A blog post by @HuntressLabs team. Awesome read, guys!…

SEKTOR7net's tweet image. Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples.

Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata.

A blog post by @HuntressLabs team. Awesome read, guys!…

0xedh a reposté

🚨 New Proxmark3 Firmware Drop – June 2025 Major MIFARE upgrades, 147% faster iClass brute-force, and new standalone ST25TB mode. 📡 #RFID #Infosec #Proxmark3 #HardwareHacking 👇 Thread:


Loading...

Something went wrong.


Something went wrong.