DarkCoder75's profile picture. {
Malware Addict
}
C# Dev, Linux, SysAdmin CyberSecu

https://cloudguardpro.com

DarkCoder

@DarkCoder75

{ Malware Addict } C# Dev, Linux, SysAdmin CyberSecu https://cloudguardpro.com

DarkCoder 已轉發

Will this Neo cloud provide access to high-end GPUs?

PunsCyber's tweet image. Will this Neo cloud provide access to high-end GPUs?

DarkCoder 已轉發

Top Hacking Gadgets

SecurityTrybe's tweet image. Top Hacking Gadgets

DarkCoder 已轉發

🔓 Hiding Processes by Unlinking Kernel EPROCESS Learn how you can manipulate the EPROCESS linked list to evade process enumeration and analysis. But watch out for patchguard! 👉 guidedhacking.com/threads/kernel…

GuidedHacking's tweet image. 🔓 Hiding Processes by Unlinking Kernel EPROCESS

Learn how you can manipulate the EPROCESS linked list to evade process enumeration and analysis. But watch out for patchguard!

👉 guidedhacking.com/threads/kernel…

DarkCoder 已轉發

7 Free resources to learn Linux & DevOps 1. Linux → linuxopsys.com 2. Bash → blog.sysxplore.com 3. AWS → explore.skillbuilder.aws 4. Azure → learn.microsoft.com 5. DevOps → edx.org/learn/devops 6. Docker → docker-curriculum.com 7. Kubernetes…

linuxopsys's tweet image. 7 Free resources to learn Linux & DevOps 

1. Linux → linuxopsys.com

2. Bash → blog.sysxplore.com

3. AWS → explore.skillbuilder.aws

4. Azure → learn.microsoft.com

5. DevOps → edx.org/learn/devops 

6. Docker → docker-curriculum.com

7. Kubernetes…

DarkCoder 已轉發

Windows RPC lateral movement quick reference for defenders. #ThreatHunting #DFIR

ACEResponder's tweet image. Windows RPC lateral movement quick reference for defenders.

#ThreatHunting #DFIR

DarkCoder 已轉發

EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter. Because your payload deserves privacy. #antimalware #itsecurity #redteam

TwoSevenOneT's tweet image. EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter.
Because your payload deserves privacy.
#antimalware #itsecurity #redteam
TwoSevenOneT's tweet image. EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter.
Because your payload deserves privacy.
#antimalware #itsecurity #redteam

DarkCoder 已轉發

Detecting Process Hollowing. A post by Leo Bastidas from @TrustedSec exploring the popular technique, where a malicious payload is concealed within a legitimate process, and providing detailed methods for its detection and defense. Source: trustedsec.com/blog/the-night… #redteam

SEKTOR7net's tweet image. Detecting Process Hollowing.

A post by Leo Bastidas from @TrustedSec exploring the popular technique, where a malicious payload is concealed within a legitimate process, and providing detailed methods for its detection and defense.

Source: trustedsec.com/blog/the-night…

#redteam…
SEKTOR7net's tweet image. Detecting Process Hollowing.

A post by Leo Bastidas from @TrustedSec exploring the popular technique, where a malicious payload is concealed within a legitimate process, and providing detailed methods for its detection and defense.

Source: trustedsec.com/blog/the-night…

#redteam…
SEKTOR7net's tweet image. Detecting Process Hollowing.

A post by Leo Bastidas from @TrustedSec exploring the popular technique, where a malicious payload is concealed within a legitimate process, and providing detailed methods for its detection and defense.

Source: trustedsec.com/blog/the-night…

#redteam…

DarkCoder 已轉發

Introduce Deep-Eye Code Name (Hestia) smart automation pentest tools with 20+ mode attack. Deep-Eye all in one pentest tools with Deep OSINT And reeconize target. Scanning method have 2 mode Quick And Full-Scan. Deep-Eye support multiple AI Provider. > github.com/zakirkun/deep-…

HackingTeam777's tweet image. Introduce Deep-Eye Code Name (Hestia) smart automation pentest tools with 20+ mode attack. Deep-Eye all in one pentest tools with Deep OSINT And reeconize target. Scanning method have 2 mode Quick And Full-Scan. Deep-Eye support multiple AI Provider.

> github.com/zakirkun/deep-…
HackingTeam777's tweet image. Introduce Deep-Eye Code Name (Hestia) smart automation pentest tools with 20+ mode attack. Deep-Eye all in one pentest tools with Deep OSINT And reeconize target. Scanning method have 2 mode Quick And Full-Scan. Deep-Eye support multiple AI Provider.

> github.com/zakirkun/deep-…

DarkCoder 已轉發

GitHub - msalman-mufin/Nullpoint-Stealer: Nullpoint Stealer Designed To Steal Everything, And Send To Nullpoint Panel. github.com/msalman-mufin/…


DarkCoder 已轉發

🕵️100 Useful Forensic Tools 🔖#cybersecurity #hacking #pentesting #security

_0b1d1's tweet image. 🕵️100 Useful Forensic Tools

🔖#cybersecurity #hacking #pentesting #security

DarkCoder 已轉發

Hacker Search Engines

SecurityTrybe's tweet image. Hacker Search Engines

DarkCoder 已轉發

These Linux commands helped me most in last 13 years of IT career Daily stuff: • ps aux | grep {process} - Find that sneaky process • lsof -i :{port} - Who's hogging that port? • df -h - The classic "we're out of space" checker • netstat -tulpn - Network connection detective…


DarkCoder 已轉發

⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders Read more: cybersecuritynews.com/defenderwrite-… A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

The_Cyber_News's tweet image. ⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders 

Read more: cybersecuritynews.com/defenderwrite-…

A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

DarkCoder 已轉發

Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques class.malware.re

5mukx's tweet image. Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques

class.malware.re

DarkCoder 已轉發

Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode... github.com/Dump-GUY/EXE-o…


DarkCoder 已轉發

🛠️ Bettercap — Network Recon & MITM Framework Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. #Bettercap #NetworkSecurity #MITMDetection

Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection

DarkCoder 已轉發

A new Zero-Click NTLM leak bypasses Microsoft's LNK patch, allowing unauthenticated NTLM hash theft on patched systems. The PoC works by exploiting UNC paths and the default shell32.dll icon reference. #NTLMleak #ZeroClick #LNKattack #Cybersecurity securityonline.info/zero-click-ntl…


DarkCoder 已轉發

GitHub - xaitax/NTSleuth: Comprehensive Windows Syscall Extraction & Analysis Framework github.com/xaitax/NTSleuth


Loading...

Something went wrong.


Something went wrong.