cppbruh's profile picture. OSCP, OSCE, OSEE

bruh

@cppbruh

OSCP, OSCE, OSEE

bruh 님이 재게시함

Windows API arsenal by @0x6970 for reversers blog.fautl.com/api-list.html

struppigel's tweet image. Windows API arsenal by
@0x6970
for reversers 

blog.fautl.com/api-list.html
struppigel's tweet image. Windows API arsenal by
@0x6970
for reversers 

blog.fautl.com/api-list.html

bruh 님이 재게시함

Patching one technique doesn't close the entire attack vector. dMSA abuse is still a problem, and @_logangoins just dropped a reality check with new tooling to prove it. Learn more about the issue & the new BadTakeover BOF. ghst.ly/42POg9L


bruh 님이 재게시함

Driver Reverse Engineering 101 eversinc33.com/posts/driver-r…

5mukx's tweet image. Driver Reverse Engineering 101

eversinc33.com/posts/driver-r…

bruh 님이 재게시함

Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns. C2:…

YungBinary's tweet image. Seeing new #NetSupport campaigns that use a new PowerShell-based loader that drops/executes NetSupport and deletes RunMRU registry values in order to hide evidence of #ClickFix execution! This one has a licensee named KAKAN, though is likely related to EVALUSION campaigns.

C2:…

bruh 님이 재게시함

Malware development Series - COFF injection and in-memory execution TLDR; This blog will explore and try to implement to execute code, a COFF object file loader, which is similar to BOF. 0xpat.github.io/Malware_develo…

5mukx's tweet image. Malware development Series - COFF injection and in-memory execution

TLDR; This blog will explore and try to implement to execute code, a COFF object file loader, which is similar to BOF.

0xpat.github.io/Malware_develo…

bruh 님이 재게시함

🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark… 🔍  In a nutshell: - EtherHiding is a technique where threat actors store part of their infection chain (code or…

vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…
vmray's tweet image. 🔥 SharkStealer - a Golang infostealer - uses the BNB Smart Chain (BSC) Testnet to resolve its C2 communication channels ("EtherHiding"). vmray.com/analyses/shark…

🔍  In a nutshell:

- EtherHiding is a technique where threat actors store part of their infection chain (code or…

bruh 님이 재게시함

Here's my latest research. I decided to dive in to exploring Polymorphic PIC shellcode and walk the reader through the process of creating their own loader via x64 assembly code and Python. Thanks for your support and feedback as always. Enjoy! g3tsyst3m.com/shellcode/pic/…


bruh 님이 재게시함

Inside x64 SEH on Windows - A deep dive into modern Windows structured exception handling #ReverseEngineering #WindowsInternals blog.elmo.sg/posts/structur…

raashidbhatt's tweet image. Inside x64 SEH on Windows   - A deep dive into modern Windows structured exception handling  

#ReverseEngineering #WindowsInternals

blog.elmo.sg/posts/structur…

bruh 님이 재게시함

❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive) (P.S. Only Real Wannabe Hackers can Watch it) youtu.be/6Zck1649AP0

medusa_0xf's tweet image. ❄️[New Video] - The Most Overlooked Bug in Web Apps: HTTP Request Smuggling (Deep Dive)

(P.S. Only Real Wannabe Hackers can Watch it)

youtu.be/6Zck1649AP0

bruh 님이 재게시함

Find hidden Endpoint - by: Sina Yeganeh ✨ -raw.githubusercontent.com/sinaayeganeh/F… #cybersec #infosec #bugbountytips


bruh 님이 재게시함

Fun little IOC in impacket-smbserver's Negotiate Protocol Response 🙃

Octoberfest73's tweet image. Fun little IOC in impacket-smbserver's Negotiate Protocol Response 🙃

bruh 님이 재게시함

Exploitation of CVE-2025–9961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500 blog.byteray.co.uk/exploiting-zer… #infosec

0xor0ne's tweet image. Exploitation of CVE-2025–9961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500

blog.byteray.co.uk/exploiting-zer…

#infosec
0xor0ne's tweet image. Exploitation of CVE-2025–9961: authenticated remote code execution via the CWMP binary on TP-Link AX10 and AX1500

blog.byteray.co.uk/exploiting-zer…

#infosec

bruh 님이 재게시함

🌐 We Hacked the npm Supply Chain of 36 Million Weekly Installs Blog: landh.tech/blog/20251003-… author: @0xLupin

mqst_'s tweet image. 🌐 We Hacked the npm Supply Chain of 36 Million Weekly Installs

Blog: landh.tech/blog/20251003-…

author: @0xLupin
mqst_'s tweet image. 🌐 We Hacked the npm Supply Chain of 36 Million Weekly Installs

Blog: landh.tech/blog/20251003-…

author: @0xLupin
mqst_'s tweet image. 🌐 We Hacked the npm Supply Chain of 36 Million Weekly Installs

Blog: landh.tech/blog/20251003-…

author: @0xLupin

bruh 님이 재게시함

Exploring Windows Defender Detection History - a file containing key forensic information like the threat file's hash, file path, initiating process, associated users, and detection/remediation timestamps. Team at Orange Defense reverse engineered the file format and internals.…

SEKTOR7net's tweet image. Exploring Windows Defender Detection History - a file containing key forensic information like the threat file's hash, file path, initiating process, associated users, and detection/remediation timestamps.

Team at Orange Defense reverse engineered the file format and internals.…

bruh 님이 재게시함

this was meant to be a simple debugging tool, but ended up being a full barebones, concurrent RFC1928 (SOCKS5) server. unnecessarily fast, very simple. gophers that are interested in learning SOCKS5 protocol may find this useful (hopefully someone does) gist.github.com/yunginnanet/c8…

yunginnanet's tweet image. this was meant to be a simple debugging tool, but ended up being a full barebones, concurrent RFC1928 (SOCKS5) server. unnecessarily fast, very simple.

gophers that are interested in learning SOCKS5 protocol may find this useful (hopefully someone does)

gist.github.com/yunginnanet/c8…

bruh 님이 재게시함

Rest in Peace to @yunginnanet a/k/a Kayos. I'm at a total loss of words. I have no idea what to say. When vx-underground first started him, and his friends with ThugCrowd, were the first to offer us hosting when no one else would. He helped us before anyone gave a shit about the…

vxunderground's tweet image. Rest in Peace to @yunginnanet a/k/a Kayos.

I'm at a total loss of words. I have no idea what to say. When vx-underground first started him, and his friends with ThugCrowd, were the first to offer us hosting when no one else would. He helped us before anyone gave a shit about the…
vxunderground's tweet image. Rest in Peace to @yunginnanet a/k/a Kayos.

I'm at a total loss of words. I have no idea what to say. When vx-underground first started him, and his friends with ThugCrowd, were the first to offer us hosting when no one else would. He helped us before anyone gave a shit about the…

bruh 님이 재게시함

🧩 Chrome Exploitation 101: The Architecture Blog: opzero.ru/en/press/101-c… author: @opzero_en

mqst_'s tweet image. 🧩 Chrome Exploitation 101: The Architecture

Blog: opzero.ru/en/press/101-c…

author: @opzero_en
mqst_'s tweet image. 🧩 Chrome Exploitation 101: The Architecture

Blog: opzero.ru/en/press/101-c…

author: @opzero_en
mqst_'s tweet image. 🧩 Chrome Exploitation 101: The Architecture

Blog: opzero.ru/en/press/101-c…

author: @opzero_en

bruh 님이 재게시함

ShellExec using msgbox.exe => in my C2 Facility. Bypassing EDR's. a cool new way = ) Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

5mukx's tweet image. ShellExec using msgbox.exe => in my C2 Facility.  Bypassing EDR's. a cool new way = ) 

Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

Loading...

Something went wrong.


Something went wrong.