KernelDBG's profile picture. I'm a virus analyst focus on Windows Security Research,Exploit Development

FFE4

@KernelDBG

I'm a virus analyst focus on Windows Security Research,Exploit Development

FFE4 님이 재게시함

Having a look #Remcos #Stealer sample today Anti-sandboxing technique spotted. It pings for a few seconds…fooling the sandbox. Stealth level: 0/10. 😏 Its a new persistence technique?🤣 ☣️2bc86fe5ea8cecd9bd2f78362446e848 app.any.run/tasks/7ac010c6…

ShanHolo's tweet image. Having a look #Remcos #Stealer sample today

Anti-sandboxing technique spotted. It pings for a few seconds…fooling the sandbox.
Stealth level: 0/10. 😏

Its a new persistence technique?🤣

☣️2bc86fe5ea8cecd9bd2f78362446e848

app.any.run/tasks/7ac010c6…

FFE4 님이 재게시함

GitHub - ZemarKhos/CVE-2025-55315-PoC-Exploit: CVE-2025-55315 PoC Exploit github.com/ZemarKhos/CVE-…


FFE4 님이 재게시함

An Introduction into Stack Spoofing - dtsec.us/2023-09-15-Sta…


FFE4 님이 재게시함

VEH-Based Function Call Obfuscation - Obfuscating function calls using Vectored Exception Handlers by redirecting execution through exception-based control flow. Uses byte swapping without memory or assembly allocation github.com/EvilBytecode/E…


FFE4 님이 재게시함

EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter. Because your payload deserves privacy. #antimalware #itsecurity #redteam

TwoSevenOneT's tweet image. EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter.
Because your payload deserves privacy.
#antimalware #itsecurity #redteam
TwoSevenOneT's tweet image. EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter.
Because your payload deserves privacy.
#antimalware #itsecurity #redteam

Services.exe dead when one’s ImagePath Buffer was empty

KernelDBG's tweet image. Services.exe dead when one’s ImagePath Buffer was empty

FFE4 님이 재게시함

Wrote a blog about creating an early exception handler for hooking and threadless process injection without relying on VEH or SEH. You can definitely use it for more than what is described in the post, enjoy :) kr0tt.github.io/posts/early-ex…


FFE4 님이 재게시함

It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware #PenTesting #BlueTeam

TwoSevenOneT's tweet image. It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware
#PenTesting #BlueTeam
TwoSevenOneT's tweet image. It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware
#PenTesting #BlueTeam
TwoSevenOneT's tweet image. It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware
#PenTesting #BlueTeam

FFE4 님이 재게시함

Another hoontr find: tprtdll.dll (like so many others) exposes some Nt/Rtl/Zw functions. It doesn't redirect to ntdll, instead it makes the syscall itself - so you can call something like NtAllocateVirtualMemoryEx without ever touching ntdll! PoC: github.com/whokilleddb/fu…

whokilleddb's tweet image. Another hoontr find: tprtdll.dll (like so many others) exposes some Nt/Rtl/Zw functions. It doesn't redirect to ntdll, instead it makes the syscall itself - so you can call something like NtAllocateVirtualMemoryEx without ever touching ntdll!

PoC: github.com/whokilleddb/fu…
whokilleddb's tweet image. Another hoontr find: tprtdll.dll (like so many others) exposes some Nt/Rtl/Zw functions. It doesn't redirect to ntdll, instead it makes the syscall itself - so you can call something like NtAllocateVirtualMemoryEx without ever touching ntdll!

PoC: github.com/whokilleddb/fu…

FFE4 님이 재게시함

#redteam Hey, look! Windows with two "System32" folders.😲 Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲 #malware #blueteam

TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two "System32" folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam
TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two "System32" folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam
TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two "System32" folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam

FFE4 님이 재게시함

Black Hat Bonus: Learn more about @kyleavery_ 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e

OutflankNL's tweet image. Black Hat Bonus: Learn more about @kyleavery_ 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e

FFE4 님이 재게시함

#redteam If you name the file long enough, your file will vanish from the Process Explorer Lower Pane. 😂 #blueteam #pentest

TwoSevenOneT's tweet image. #redteam
If you name the file long enough, your file will vanish from the Process Explorer Lower Pane. 😂
#blueteam #pentest
TwoSevenOneT's tweet image. #redteam
If you name the file long enough, your file will vanish from the Process Explorer Lower Pane. 😂
#blueteam #pentest

FFE4 님이 재게시함

Unicornを使ったマルウェア解析の効率化 | IIJ Security Diary sect.iij.ad.jp/blog/2025/08/m… @IIJSECT


FFE4 님이 재게시함

Out Of Control: How KCFG and KCET Redefine Control Flow Integrity in the Windows Kernel by @33y0re i.blackhat.com/BH-USA-25/Pres…

alexjplaskett's tweet image. Out Of Control: How KCFG and
KCET Redefine Control Flow
Integrity in the Windows Kernel by @33y0re 

i.blackhat.com/BH-USA-25/Pres…
alexjplaskett's tweet image. Out Of Control: How KCFG and
KCET Redefine Control Flow
Integrity in the Windows Kernel by @33y0re 

i.blackhat.com/BH-USA-25/Pres…

FFE4 님이 재게시함

Nice trick showing that the very same zip can be seen differently by two different programs. I've examined how this quirk could help us in zip path traversal attacks: blog.isec.pl/disguises-zip-…


FFE4 님이 재게시함

Want to learn about Chrome exploitation and the role of WebAssembly in it? In our new article, we'll break down the world of WASM, how it interacts with V8, and use CVE-2024-2887 as a case study to show how flaws in WASM can lead to RCE. Read it here: ssd-disclosure.com/an-introductio…


FFE4 님이 재게시함

Dropped a PoC demonstrating how to leverage “IOCTL_VOLSNAP_DELETE_SNAPSHOT” (0x53C038) to delete Windows shadow copies github.com/NUL0x4C/IOCTL_…


FFE4 님이 재게시함

Announcing our whitepaper on the future of endpoint security. preludesecurity.com/runtime-memory…


Loading...

Something went wrong.


Something went wrong.