
bruh
@cppbruh
OSCP, OSCE, OSEE
Bunları beğenebilirsin
Windows Kernel-mode objects googleprojectzero.blogspot.com/2025/04/the-wi…

Valve Anti-Cheat (VAC) reverse engineering codeneverdies.github.io/posts/gh-2/ Credits @codeneverdies #cybersecurity

As expected the MacBook Pro M5 brings #MTE to #MacOS2601 - you can learn about the details in our MacOS and iOS security kernel internals training next month antid0te-sg.com/blog/25-11-17-…

New blog post in a while — this one covers "executing" shellcode from non-executable memory and "bypassing" DEP/NX. Since I didn’t have a proofreader this time, I’d really appreciate it if you could let me know about any errors or misinterpretations you spot in the article.…

When static analysis hits a wall, dynamic tracing with Frida’s Stalker API reveals what’s really happening at runtime. Learn to trace ARM instructions, filter for ldr/str, and see how obfuscated apps manipulate data: 🔗 8ksec.io/advanced-frida… #ReverseEngineering #AndroidSecurity…
Dynamic shellcode loader with sophisticated evasion capabilities github.com/0xNinjaCyclone…
#kernelctf #CVE-2025-* exploits + documentation for each vulns are available: github.com/google/securit…
🛠️ RealBlindingEDR Kernel-level AV/EDR removal for red teams. Advanced evasion methods in one toolkit. Try: github.com/myzxcg/RealBli…

In this post, I cover the DCOM objects in the dcomexec.py , how to fix some issues, and how to bypass Defender for MMC20. I plan to publish part two soon, focusing on new DCOM objects I discovered time ago that can be used for lateral movement sud0ru.ghost.io/yet-another-dc…
LD_PRELOAD TLS cert bypass for embedded security research (tutorial) f0rw4rd.github.io/posts/tls-nove… Credits @f0rw4rd_at #infosec


Finally migrated Sanctum EDR's methodology of DLL injection to using APC's and a shellcode bootstrap for LdrLoadDll. Huge thanks to @eversinc33 who helped me out with the shellcode stub & methodology 👑 You can find the injection module here if curious: github.com/0xflux/Sanctum…
[Crystal Kit] Evasion kit for Cobalt Strike. github.com/rasta-mouse/Cr…
A student booted the empty SARIOT lab, followed our method, ran selective fuzzing — and found a real vulnerability on the spot. Now he’s chasing the ROP chain. Hands-on labs = game changer. 🎯🔎 fuzzsociety.org/fuzzsociety-co… #youaretheexploit #fuzzing #VulnResearch

IDA tips for reversing U-Boot errno.fr/IDA_tips_for_r…
OPSEC: Read the Code Before It Burns Your Op - BlackSnufkin (@BlackSnufkin42) blacksnufkin.github.io/posts/opsec-of…
Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing 0xdarkvortex.dev/proxying-dll-l… My Rust version PoC : github.com/Whitecat18/Rus…

#exploit #Kernel_Security Ksmbd Vulnerability Research Part 1 - CVE-2024-50283, CVE-2024-50285, CVE-2024-50286 - blog.doyensec.com/2025/01/07/ksm… Part 2 - Fuzzing Improvements and Vulnerability Discovery - blog.doyensec.com/2025/09/02/ksm… Part 3 - Exploiting CVE-2025-37947 -…
You need to analyse an compiled (.jar) Java application? Always decompile the code with JD-GUI to see how it works internally. And if you have client side authentication only for example use ReCaf to easily modify the source and recompile in a short amount of time! 😎

Understanding Null Pointer Dereference in Windows Kernel Drivers whiteknightlabs.com/2025/06/24/und…

Watcher from @vulnlab_eu released on @hackthebox_eu last week. It's a web-centric box with Zabbix exploitation, and then changing the source code to capture logins. I'll escalate though TeamCity. 0xdf.gitlab.io/2025/10/09/htb…
United States Trendler
- 1. No Kings 1.1M posts
- 2. Ole Miss 11.2K posts
- 3. #UFCVancouver 10.2K posts
- 4. Georgia 62.7K posts
- 5. Carnell Tate 5,922 posts
- 6. Brian Kelly 7,825 posts
- 7. Vandy 13K posts
- 8. Shapen N/A
- 9. Schumann 1,335 posts
- 10. Constitutional Republic 21K posts
- 11. Lane Kiffin 5,684 posts
- 12. Vanderbilt 10.7K posts
- 13. Clemson 5,023 posts
- 14. Beamer 3,680 posts
- 15. Barlow 3,204 posts
- 16. UNLV 2,177 posts
- 17. Julian Sayin 1,860 posts
- 18. Cash Jones N/A
- 19. Hammond 2,272 posts
- 20. Lagway N/A
Something went wrong.
Something went wrong.