SubZero0x9's profile picture. Security Analyst and Researcher. Trying very hard to figure out C, Assembly and Windows Internals. Eternal N00b.🐶

Susan Ghosh

@SubZero0x9

Security Analyst and Researcher. Trying very hard to figure out C, Assembly and Windows Internals. Eternal N00b.🐶

Susan Ghosh reposted

Today I am releasing a new blog on Windows on ARM! It comes from the perspective of one, like myself, who comes from an x86 background and is new, but, interested in Windows on ARM! ELs, OS & hypervisor behavior (with VBS), virtual memory, paging, & more! connormcgarr.github.io/arm64-windows-…


Susan Ghosh reposted

Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…


Susan Ghosh reposted

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Susan Ghosh reposted

Windows local privilege escalation through the bitpixie vulnerability blog.syss.com/posts/bitpixie/


Susan Ghosh reposted

this is my short analysis of a little-known security feature built into Windows that inadvertently broke one of our authenticode signatures recently elastic.co/security-labs/…


Susan Ghosh reposted

You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method. github.com/Mr-Un1k0d3r/Do…


Susan Ghosh reposted

why do people hate secure boot? honest question


Susan Ghosh reposted

Black Hat Bonus: Learn more about @kyleavery_ 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e

OutflankNL's tweet image. Black Hat Bonus: Learn more about @kyleavery_ 's research on training self-hosted LLMs to generate evasive malware and creation of a 7B parameter model that generates evasive Cobalt Strike shellcode loaders able to bypass Microsoft Defender for Endpoint. ow.ly/1EUf50WBI5e

Susan Ghosh reposted

🎁 We’re giving away 1 FREE seat to our premium live workshop: “EDR Internals – Research & Development”! 🔥 40+ hours of hands-on labs 🔍 Reverse real-world EDRs, build custom detection logic 🧠 Dive into syscall hooking, ETW tracing, kernel-mode techniques & more Want in? ✅…


Susan Ghosh reposted

I was messing around with symbol resolution in ELF and came up with an obfuscation technique on abusing symbol resolution in ELF programs that is able to trick tools (i.e. Ghidra, IDA, GDB) into showing the wrong library function calls. blog.elmo.sg/posts/breaking…


Susan Ghosh reposted

This will be one of the few OSEE trainings held in Asia. Welcome to Taiwan :) blog.orange.tw/posts/2025-07-…


Susan Ghosh reposted

Under-the-hood, Ember uses LightGBM to score a sample from 0 to 1. I added this functionality into Citadel so any binaries added to the framework are now summarised and scored as well as the rest of the Citadel analysis. Read it here: mez0.cc/posts/citadel-…


Susan Ghosh reposted

Including nice tool release 🔥 github.com/temp43487580/E…

Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 👀👌

ShitSecure's tweet image. Compromising Entra joined devices with P2P certificate authentication by @TEMP43487580 👀👌


Susan Ghosh reposted

This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…


Susan Ghosh reposted

Windows 11 24H2 broke a popular malware evasion technique! The Lloyd Labs self-deletion method now fails because of NTFS changes, so I spent time with kernel debugging to figure out why and how to fix it. Full technical breakdown: tkyn.dev/2025-6-8-The-N…


Susan Ghosh reposted

Have you ever wondered if there was a way to deploy a "Remote EDR"? Today I'm excited to share research I've been working on for the past couple months. This dives into DCOM Interfaces that enable remote ETW trace sessions without dropping an agent to disk. Includes a detailed…


Susan Ghosh reposted

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…


Susan Ghosh reposted

(1/x) For some reason people keep asking me how to get into reverse engineering. The obvious answer would be do CTFs or reverse malware (aka just do it), but I also think game hacking/modding (not cheating!) can be fun and still provide the same learning experience. An example:


Loading...

Something went wrong.


Something went wrong.