omnitheon's profile picture. Offensive Security / Threathunter / Detection Engineer /
@CDMDepaul and @NationalCCDC Alum

Adam Slowik

@omnitheon

Offensive Security / Threathunter / Detection Engineer / @CDMDepaul and @NationalCCDC Alum

Adam Slowik 已轉發

Adam Slowik 已轉發

If your agent gets flooded - detect the flooding. If code gets obfuscated - detect the obfuscation. If ETW gets silenced - detect the silence. If the EDR gets killed - detect the killing. If logs get cleared - detect the clearing. The act of hiding is often more suspicious than…


Adam Slowik 已轉發

Places on Earth that don't look real - thread 🧵 1. Basilica Cistern, Istanbul

JamesLucasIT's tweet image. Places on Earth that don't look real - thread 🧵 

1. Basilica Cistern, Istanbul

Adam Slowik 已轉發

🚨 Top 5 Remote Access Tools Exploited by Threat Actors in the First Half of 2025. ⚠️ While legitimate and widely used by IT teams, Remote Monitoring and Management tools are increasingly used by threat actors to establish persistence, bypass defenses, and exfiltrate data.…

anyrun_app's tweet image. 🚨 Top 5 Remote Access Tools Exploited by Threat Actors in the First Half of 2025.    
⚠️ While legitimate and widely used by IT teams, Remote Monitoring and Management tools are increasingly used by threat actors to establish persistence, bypass defenses, and exfiltrate data.…

Adam Slowik 已轉發

Jim Rohn explains the Secret to making more Money.‼️‼️


Adam Slowik 已轉發

⏰ Scott Redler’s #630club - LIVE Stock Market Analysis $NVDA $TSLA $AMZN $SPY ➡️ FREE NEWSLETTER: t3live.com/show x.com/i/broadcasts/1…


Adam Slowik 已轉發

With Gemini Live on Google #Pixel9, there’s a whole new way to talk with your phone: goo.gle/3Q8mbDu #TeamPixel


Adam Slowik 已轉發

This might be one of the best reddit posts I've seen in a while no cap fr fr

DorianDevelops's tweet image. This might be one of the best reddit posts I've seen in a while no cap fr fr

Adam Slowik 已轉發

Kobe is a 5x NBA Champion. He also holds the all-time record for missed shots. Babe Ruth is a 7x World Series Champion. He also led the MLB in strikeouts for 5 seasons. Tom Brady is a 7x Superbowl Champion. He also holds the record for most passes intercepted in Superbowl…


Adam Slowik 已轉發

Internet archive got owned.

usetraceix's tweet image. Internet archive got owned.

Adam Slowik 已轉發

Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the talk.

0x64616e's tweet image. Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the talk.

Adam Slowik 已轉發

CrowdStrike is offering its partners a $10 Uber Eats gift card as an apology. When TechCrunch checked the voucher, the Uber Eats page provided an error message that said the gift card “has been canceled by the issuing party and is no longer valid.” : techcrunch.com/2024/07/24/cro…

binitamshah's tweet image. CrowdStrike is offering its partners a $10 Uber Eats gift card as an apology. 

When TechCrunch checked the voucher, the Uber Eats page provided an error message that said the gift card “has been canceled by the issuing party and is no longer valid.” : techcrunch.com/2024/07/24/cro…

Adam Slowik 已轉發

modern cs textbooks should just be this

parityprime's tweet image. modern cs textbooks should just be this
parityprime's tweet image. modern cs textbooks should just be this

Adam Slowik 已轉發

Lots of interest in LLMs in reverse engineering, but most integrations have been superficial. Want to see how we are pushing the state of the art? See our latest blog post on an upcoming Sidekick feature: binary.ninja/2024/06/28/sid…


Adam Slowik 已轉發

If you want to become a world-class programmer, read these 8 books:


Adam Slowik 已轉發

ASN enumeration is an important yet frequently overlooked recon method. Finding the ASN can reveal the target's network ranges. Tools include: - asnlookup.com - bgp.he.net - @Yassineaboukir's Asnlookup And more! What tools do you like to use?

Bugcrowd's tweet image. ASN enumeration is an important yet frequently overlooked recon method. 

Finding the ASN can reveal the target's network ranges.

Tools include:
- asnlookup.com
- bgp.he.net
- @Yassineaboukir's Asnlookup

And more!

What tools do you like to use?

Adam Slowik 已轉發

Nothing new to be fair. Have seen attackers using Live Response of MDE as well to execute commands, etc.

Abuse of Crowdstrike response shell access for C2. Don't forget that attackers can sometimes use EDRs and other security tools to go from compromising cloud accounts to compromising on-prem machines and user devices.

arekfurt's tweet image. Abuse of Crowdstrike response shell access for C2.

Don't forget that attackers can sometimes use EDRs and other security tools to go from compromising cloud accounts to compromising on-prem machines and user devices.


Adam Slowik 已轉發

Moloch, a concept of a self-destructive race to gain rewards, poses a grave threat to humanity. This notion, stemming from an ancient god associated with sacrifice, embodies a race to the bottom with destructive consequences. danielmiessler.com/p/moloch-the-m…


Adam Slowik 已轉發

dating reverse engineers be like:

rcx86's tweet image. dating reverse engineers be like:

Adam Slowik 已轉發

Thanks for sharing. Basically rewrote a large part of my private agent to adapt this and it works wonderful. No more memory toggling. Every function now takes a KnSelf as a first param which is the instance passed. For function like beacon api can use a macro that gets it.

C5pider's tweet image. Thanks for sharing. Basically rewrote a large part of my private agent to adapt this and it works wonderful. No more memory toggling. Every function now takes a KnSelf as a first param which is the instance passed. For function like beacon api can use a macro that gets it.
C5pider's tweet image. Thanks for sharing. Basically rewrote a large part of my private agent to adapt this and it works wonderful. No more memory toggling. Every function now takes a KnSelf as a first param which is the instance passed. For function like beacon api can use a macro that gets it.
C5pider's tweet image. Thanks for sharing. Basically rewrote a large part of my private agent to adapt this and it works wonderful. No more memory toggling. Every function now takes a KnSelf as a first param which is the instance passed. For function like beacon api can use a macro that gets it.

After reading @C5pider's blog I got an idea how to implement global shellcode context without NtProtectVirtualMemory: Add magic header to context struct, place context on stack, append its address to peb.ProcessHeaps and retrieve it from there when needed. No syscalls required.

0x64616e's tweet image. After reading @C5pider's blog I got an idea how to implement global shellcode context without NtProtectVirtualMemory: Add magic header to context struct, place context on stack, append its address to peb.ProcessHeaps and retrieve it from there when needed. No syscalls required.


Loading...

Something went wrong.


Something went wrong.