
bruh
@cppbruh
OSCP, OSCE, OSEE
Potrebbero piacerti
Windows Kernel-mode objects googleprojectzero.blogspot.com/2025/04/the-wi…

Valve Anti-Cheat (VAC) reverse engineering codeneverdies.github.io/posts/gh-2/ Credits @codeneverdies #cybersecurity

As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month antid0te-sg.com/blog/25-11-17-…

New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX. Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

When static analysis hits a wall, dynamic tracing with Frida’s Stalker API reveals what’s really happening at runtime. Learn to trace ARM instructions, filter for ldr/str, and see how obfuscated apps manipulate data: 🔗 8ksec.io/advanced-frida… #ReverseEngineering #AndroidSecurity…
Dynamic shellcode loader with sophisticated evasion capabilities github.com/0xNinjaCyclone…
#kernelctf #CVE-2025-* exploits + documentation for each vulns are available: github.com/google/securit…
🛠️ RealBlindingEDR Kernel-level AV/EDR removal for red teams. Advanced evasion methods in one toolkit. Try: github.com/myzxcg/RealBli…

In this post, I cover the DCOM objects in the dcomexec.py , how to fix some issues, and how to bypass Defender for MMC20. I plan to publish part two soon, focusing on new DCOM objects I discovered time ago that can be used for lateral movement sud0ru.ghost.io/yet-another-dc…
LD_PRELOAD TLS cert bypass for embedded security research (tutorial) f0rw4rd.github.io/posts/tls-nove… Credits @f0rw4rd_at #infosec


Finally migrated Sanctum EDR's methodology of DLL injection to using APC's and a shellcode bootstrap for LdrLoadDll. Huge thanks to @eversinc33 who helped me out with the shellcode stub & methodology 👑 You can find the injection module here if curious: github.com/0xflux/Sanctum…
[Crystal Kit] Evasion kit for Cobalt Strike. github.com/rasta-mouse/Cr…
A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot. Now he’s chasing the ROP chain. Hands-on labs = game changer. 🎯🔎 fuzzsociety.org/fuzzsociety-co… #youaretheexploit #fuzzing #VulnResearch

OPSEC: Read the Code Before It Burns Your Op - BlackSnufkin (@BlackSnufkin42) blacksnufkin.github.io/posts/opsec-of…
Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing 0xdarkvortex.dev/proxying-dll-l… My Rust version PoC : github.com/Whitecat18/Rus…

#exploit #Kernel_Security Ksmbd Vulnerability Research Part 1 - CVE-2024-50283, CVE-2024-50285, CVE-2024-50286 - blog.doyensec.com/2025/01/07/ksm… Part 2 - Fuzzing Improvements and Vulnerability Discovery - blog.doyensec.com/2025/09/02/ksm… Part 3 - Exploiting CVE-2025-37947 -…
You need to analyse an compiled (.jar) Java application? Always decompile the code with JD-GUI to see how it works internally. And if you have client side authentication only for example use ReCaf to easily modify the source and recompile in a short amount of time! 😎

Understanding Null Pointer Dereference in Windows Kernel Drivers whiteknightlabs.com/2025/06/24/und…

Watcher from @vulnlab_eu released on @hackthebox_eu last week. It's a web-centric box with Zabbix exploitation, and then changing the source code to capture logins. I'll escalate though TeamCity. 0xdf.gitlab.io/2025/10/09/htb…
United States Tendenze
- 1. #AEWWrestleDream 63.3K posts
- 2. #sabrinanightlive 6,570 posts
- 3. Stanford 7,268 posts
- 4. Darby 10K posts
- 5. Hugh Freeze 2,777 posts
- 6. Lincoln Riley 2,642 posts
- 7. Mizzou 5,896 posts
- 8. Kentucky 25K posts
- 9. Bama 15.8K posts
- 10. Utah 30.6K posts
- 11. Stoops 4,902 posts
- 12. Arch 25.6K posts
- 13. #RollTide 8,745 posts
- 14. Tennessee 54.9K posts
- 15. Sark 4,497 posts
- 16. Notre Dame 16.4K posts
- 17. Nobody's Son 1,148 posts
- 18. Jackson Arnold 1,034 posts
- 19. Mike Norvell N/A
- 20. #StreamFighters4 92.9K posts
Something went wrong.
Something went wrong.