cppbruh's profile picture. OSCP, OSCE, OSEE

bruh

@cppbruh

OSCP, OSCE, OSEE

Repost di bruh
raashidbhatt's tweet image. Windows Kernel-mode objects

googleprojectzero.blogspot.com/2025/04/the-wi…

Repost di bruh

Valve Anti-Cheat (VAC) reverse engineering codeneverdies.github.io/posts/gh-2/ Credits @codeneverdies #cybersecurity

0xor0ne's tweet image. Valve Anti-Cheat (VAC) reverse engineering

codeneverdies.github.io/posts/gh-2/

Credits @codeneverdies

#cybersecurity

Repost di bruh

As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month antid0te-sg.com/blog/25-11-17-…

i0n1c's tweet image. As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month antid0te-sg.com/blog/25-11-17-…

Repost di bruh

New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX. Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

VirtualAllocEx's tweet image. New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX.

Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

Repost di bruh

When static analysis hits a wall, dynamic tracing with Frida’s Stalker API reveals what’s really happening at runtime. Learn to trace ARM instructions, filter for ldr/str, and see how obfuscated apps manipulate data: 🔗 8ksec.io/advanced-frida… #ReverseEngineering #AndroidSecurity


Repost di bruh

#kernelctf #CVE-2025-* exploits + documentation for each vulns are available: github.com/google/securit…


Repost di bruh

🛠️ RealBlindingEDR Kernel-level AV/EDR removal for red teams. Advanced evasion methods in one toolkit. Try: github.com/myzxcg/RealBli…

IntCyberDigest's tweet image. 🛠️ RealBlindingEDR  

Kernel-level AV/EDR removal for red teams. Advanced evasion methods in one toolkit.  

Try: github.com/myzxcg/RealBli…

Repost di bruh

In this post, I cover the DCOM objects in the dcomexec.py , how to fix some issues, and how to bypass Defender for MMC20. I plan to publish part two soon, focusing on new DCOM objects I discovered time ago that can be used for lateral movement sud0ru.ghost.io/yet-another-dc…


Repost di bruh

LD_PRELOAD TLS cert bypass for embedded security research (tutorial) f0rw4rd.github.io/posts/tls-nove… Credits @f0rw4rd_at #infosec

0xor0ne's tweet image. LD_PRELOAD TLS cert bypass for embedded security research (tutorial)

f0rw4rd.github.io/posts/tls-nove…

Credits @f0rw4rd_at

#infosec
0xor0ne's tweet image. LD_PRELOAD TLS cert bypass for embedded security research (tutorial)

f0rw4rd.github.io/posts/tls-nove…

Credits @f0rw4rd_at

#infosec

Repost di bruh

Finally migrated Sanctum EDR's methodology of DLL injection to using APC's and a shellcode bootstrap for LdrLoadDll. Huge thanks to @eversinc33 who helped me out with the shellcode stub & methodology 👑 You can find the injection module here if curious: github.com/0xflux/Sanctum…


Repost di bruh

A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot. Now he’s chasing the ROP chain. Hands-on labs = game changer. 🎯🔎 fuzzsociety.org/fuzzsociety-co… #youaretheexploit #fuzzing #VulnResearch

fuzzsociety_org's tweet image. A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot.
Now he’s chasing the ROP chain.
Hands-on labs = game changer. 🎯🔎
 fuzzsociety.org/fuzzsociety-co…
#youaretheexploit #fuzzing #VulnResearch

Repost di bruh

IDA tips for reversing U-Boot errno.fr/IDA_tips_for_r…


Repost di bruh

OPSEC: Read the Code Before It Burns Your Op - BlackSnufkin (@BlackSnufkin42) blacksnufkin.github.io/posts/opsec-of…


Repost di bruh

Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing 0xdarkvortex.dev/proxying-dll-l… My Rust version PoC : github.com/Whitecat18/Rus…

5mukx's tweet image. Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing

0xdarkvortex.dev/proxying-dll-l…

My Rust version PoC : github.com/Whitecat18/Rus…

Repost di bruh

#exploit #Kernel_Security Ksmbd Vulnerability Research Part 1 - CVE-2024-50283, CVE-2024-50285, CVE-2024-50286 - blog.doyensec.com/2025/01/07/ksm… Part 2 - Fuzzing Improvements and Vulnerability Discovery - blog.doyensec.com/2025/09/02/ksm… Part 3 - Exploiting CVE-2025-37947 -…


Repost di bruh

You need to analyse an compiled (.jar) Java application? Always decompile the code with JD-GUI to see how it works internally. And if you have client side authentication only for example use ReCaf to easily modify the source and recompile in a short amount of time! 😎

ShitSecure's tweet image. You need to analyse an compiled (.jar) Java application? Always decompile the code with JD-GUI to see how it works internally. And if you have client side authentication only for example use ReCaf to easily modify the source and recompile in a short amount of time! 😎

Repost di bruh

Understanding Null Pointer Dereference in Windows Kernel Drivers whiteknightlabs.com/2025/06/24/und…

5mukx's tweet image. Understanding Null Pointer Dereference in Windows Kernel Drivers

whiteknightlabs.com/2025/06/24/und…

Repost di bruh

Watcher from @vulnlab_eu released on @hackthebox_eu last week. It's a web-centric box with Zabbix exploitation, and then changing the source code to capture logins. I'll escalate though TeamCity. 0xdf.gitlab.io/2025/10/09/htb…


Loading...

Something went wrong.


Something went wrong.