RET2_pwn's profile picture. #24 y/o | Binary Exploitation Player | Wannabe Malware Developer & Researcher

RET2Pwn

@RET2_pwn

#24 y/o | Binary Exploitation Player | Wannabe Malware Developer & Researcher

RET2Pwn сделал(а) репост

Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy! eversinc33.com/posts/anti-ant…

eversinc33.com

(Anti-)Anti-Rootkit Techniques - Part II: Stomped Drivers and Hidden Threads

Detectin driver 'stomping' and hiding system threads by manipulating the PspCidTable.


RET2Pwn сделал(а) репост

I'm glad to release Jormungandr! Jormungandr is a kernel COFF loader inspired by @TrustedSec's COFF loader that allows kernel developers to write and execute their COFFs in the kernel and making more modular rootkits. github.com/Idov31/Jormung… #infosec #cybersecurity


RET2Pwn сделал(а) репост

🔥 Big update! Nanodump now supports the PPLMedic exploit! meaning you can dump LSASS on an up-to-date system with PPL enabled 😃 github.com/fortra/nanodump


RET2Pwn сделал(а) репост

I've just released acheron, a package that you can use to add indirect syscalls capabilities to your Go tradecraft. github.com/f1zm0/acheron


RET2Pwn сделал(а) репост

Simple Disassembler/Assembler for Yan85 from pwn.college could be used with yan85_architecture challenges github.com/flex0geek/Disa…


RET2Pwn сделал(а) репост

@OutflankNL blog: Attacking Visual Studio for Initial Access. The post shows how viewing source code can lead to compromise of a dev's workstation. A journey into COM, type libraries and the inner workings of VS. Plus practical examples for red team ops. outflank.nl/blog/2023/03/2…


RET2Pwn сделал(а) репост

We've just released the first post in the Cobalt Strike reflective loader blog series! 🥷This one took allot of effort and I am excited to share it with you! The better it does, the better i'll make the next ones 😉 securityintelligence.com/posts/defining…


Loading...

Something went wrong.


Something went wrong.