#windowsinternals 검색 결과

Unlock forbidden Windows knowledge! 🤫💻 Find the PEB through truly undetected means and pop calculator 💥 The non-golf form will be available below 👇 #redteamtips #windowsinternals #rust

daaximus's tweet image. Unlock forbidden Windows knowledge! 🤫💻
Find the PEB through truly undetected means and pop calculator 💥
The non-golf form will be available below 👇

#redteamtips #windowsinternals #rust

Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

"Contribute to Open Source Software with Me" Bblwrp — pronounced bubble wrap, as in “bubble wrap” or “insulate” your software. Join the fun: github.com/DesignsbyBlanc… #WindowsInternals #IT #Microsoft #opensourcesoftware #softwaredevelopement #programming #cplusplus


Windows memory management is one of the most critical areas of #WindowsInternals!❌ Watch @samilaiho bust some myths around it in this demo from our previous Advanced Windows Security Course 👉 youtube.com/watch?v=CBHYp3… #WindowsSecurity


Check it out and level up your skills: blog.dv08.in/blog/windows-p… one Windows process hack you've used? Drop it in the replies! #WindowsInternals #CyberSecurity #Programming #TechTips (Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

mindbender08's tweet image. Check it out and level up your skills: blog.dv08.in/blog/windows-p… 
one Windows process hack you've used? Drop it in the replies!  
#WindowsInternals #CyberSecurity #Programming #TechTips 

(Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

New video: Inside Windows Sessions with @zodiacon. Learn how Windows manages processes, desktops & security inside sessions. trainsec.net/library/window… #WindowsInternals #CyberSecurity #TrainSec

TrainSec's tweet image. New video: Inside Windows Sessions with @zodiacon.
Learn how Windows manages processes, desktops & security inside sessions.

trainsec.net/library/window…

#WindowsInternals #CyberSecurity #TrainSec

¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_

EuskalHack's tweet image. ¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_

👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2 🧠 Learn how to defeat: ✅ PowerShell Logging ✅ ETW ✅ SmartScreen ✅ MoTW ✅ C# Reflection ✅ More stealth tricks verylazytech.com/windows/antivi… #AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

verylazytech's tweet image. 👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2

🧠 Learn how to defeat:
✅ PowerShell Logging
✅ ETW
✅ SmartScreen
✅ MoTW
✅ C# Reflection
✅ More stealth tricks
verylazytech.com/windows/antivi…
#AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

Excited to share that I’ve completed the Windows Internals training! A big thank to @TrainSec @zodiacon and everyone who contributed to this training. Looking forward to applying these insights in real-world scenarios! #WindowsInternals #CyberSecurity #Learning #WinDbg #Malware

PramodSalvi20's tweet image. Excited to share that I’ve completed the Windows Internals training!

A big thank to @TrainSec @zodiacon and everyone who contributed to this training. Looking forward to applying these insights in real-world scenarios!

#WindowsInternals #CyberSecurity #Learning #WinDbg #Malware

Enroll now for our 40-hour live workshop “EDR Internals: R&D,” co-taught with @MalFuzzer. Starts 23 Oct 2025. Dissect & build EDR drivers, master evasion techniques. Early-bird $1,450 ends 30 Sep. Details: trainsec.net/courses/edr-in… #EDR #WindowsInternals


و با نوشتن رول در #سوریکاتا، به شناسایی Signature در ترافیک دانلودی پرداختیم. در نهایت این بخش رو به PE Parser اضافه کردیم. مشاهده در یوتیوب: youtu.be/hr0WQaeNJdU?si… اسلاید و کدها: github.com/onhexgroup/Tut… #ویندوز_اینترنالز #WindowsInternals #redteam #Blueteam #PEParser #Lief

onhexgroup's tweet card. قسمت چهارم: NT Headers بخش Signature

youtube.com

YouTube

قسمت چهارم: NT Headers بخش Signature


3️⃣ 100% CPU but no clear culprit? 🔥 Run !runaway in WinDbg. 👉 Often it’s 1 runaway thread hogging cycles, not “the system.” #Debugging #WindowsInternals


NTFS Alternate Data Streams (ADS) are a lesser-known feature that let you hide data inside files. Used for stealthy persistence, evasion, or covert storage (for example, to store payloads). Most tools — and users — completely overlook them. #CyberSecurity #DFIR #WindowsInternals

V4Valerius's tweet image. NTFS Alternate Data Streams (ADS) are a lesser-known feature that let you hide data inside files.
Used for stealthy persistence, evasion, or covert storage (for example, to store payloads).
Most tools — and users — completely overlook them.
#CyberSecurity #DFIR #WindowsInternals

Sometimes I crave learning on my own accord! Do you think that its going to be wasted effort? #WindowsInternals #WindowsAPI #Learning

SaraM67974's tweet image. Sometimes I crave learning on my own accord!
Do you think that its going to be wasted effort?
 #WindowsInternals #WindowsAPI #Learning

github.com/DebugPrivilege… is an amazing (free!) resource for learning Windows Internals / Debugging / Troubleshooting. #windowsinternals #debugging

Check out my GitHub :) Lots of practical examples.



New video: Inside Windows Sessions with @zodiacon. Learn how Windows manages processes, desktops & security inside sessions. trainsec.net/library/window… #WindowsInternals #CyberSecurity #TrainSec

TrainSec's tweet image. New video: Inside Windows Sessions with @zodiacon.
Learn how Windows manages processes, desktops & security inside sessions.

trainsec.net/library/window…

#WindowsInternals #CyberSecurity #TrainSec

6️⃣ Commit ≠ Working Set. Commit = memory apps asked for. Working Set = what’s in RAM now. High commit doesn’t mean “out of memory.” Check with RamMap. 📊 #WindowsInternals #Memory


3️⃣ 100% CPU but no clear culprit? 🔥 Run !runaway in WinDbg. 👉 Often it’s 1 runaway thread hogging cycles, not “the system.” #Debugging #WindowsInternals


1️⃣ Memory leaks ≠ high RAM usage. Windows caches memory aggressively. 🚀 👉 The real issue is Private Bytes climbing without release. Use PoolMon or WinDbg !vm. #WindowsInternals #Debugging


Just finished a new whitepaper: COMouflage – COM-based DLL Surrogate Injection I tested the technique against three major EDRs: - Microsoft Defender – bypassed - Palo Alto Cortex XDR – bypassed - SentinelOne – bypassed github.com/zero2504/COMou… #malware #COM #windowsinternals


Custom Windows shellcode leverages PEB and TEB structures for stealthy API resolution, dynamic payload control, and detection evasion. Encoding strings as hex keeps payloads self-contained and covert. #WindowsInternals #ShellcodeCraft #USA ift.tt/RukcYeH


و با نوشتن رول در #سوریکاتا، به شناسایی Signature در ترافیک دانلودی پرداختیم. در نهایت این بخش رو به PE Parser اضافه کردیم. مشاهده در یوتیوب: youtu.be/hr0WQaeNJdU?si… اسلاید و کدها: github.com/onhexgroup/Tut… #ویندوز_اینترنالز #WindowsInternals #redteam #Blueteam #PEParser #Lief

onhexgroup's tweet card. قسمت چهارم: NT Headers بخش Signature

youtube.com

YouTube

قسمت چهارم: NT Headers بخش Signature


"Contribute to Open Source Software with Me" Bblwrp — pronounced bubble wrap, as in “bubble wrap” or “insulate” your software. Join the fun: github.com/DesignsbyBlanc… #WindowsInternals #IT #Microsoft #opensourcesoftware #softwaredevelopement #programming #cplusplus


Windows memory management is one of the most critical areas of #WindowsInternals!❌ Watch @samilaiho bust some myths around it in this demo from our previous Advanced Windows Security Course 👉 youtube.com/watch?v=CBHYp3… #WindowsSecurity


Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

Check it out and level up your skills: blog.dv08.in/blog/windows-p… one Windows process hack you've used? Drop it in the replies! #WindowsInternals #CyberSecurity #Programming #TechTips (Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

mindbender08's tweet image. Check it out and level up your skills: blog.dv08.in/blog/windows-p… 
one Windows process hack you've used? Drop it in the replies!  
#WindowsInternals #CyberSecurity #Programming #TechTips 

(Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

Day 4 – SOC Analyst Journey with @Level_Effect Hands-on with: 🔹Creating & managing background services 🔹Automating tasks with Task Scheduler Learning how Windows ticks behind the scenes. #SOCAnalyst #CybersecurityLabs #WindowsInternals

JesutofunmiAkan's tweet image. Day 4 – SOC Analyst Journey with @Level_Effect 
Hands-on with:

 🔹Creating & managing background services
 🔹Automating tasks with Task Scheduler

Learning how Windows ticks behind the scenes.
#SOCAnalyst #CybersecurityLabs #WindowsInternals
JesutofunmiAkan's tweet image. Day 4 – SOC Analyst Journey with @Level_Effect 
Hands-on with:

 🔹Creating & managing background services
 🔹Automating tasks with Task Scheduler

Learning how Windows ticks behind the scenes.
#SOCAnalyst #CybersecurityLabs #WindowsInternals

Day 3 – SOC Analyst Journey with @Level_Effect Diving deeper into the system: 🔹Used "icacls" to grant file/folder permissions 🔹Monitored & terminated user processes via Task Manager #SOC100 #BlueTeamSkills #WindowsSecurity

JesutofunmiAkan's tweet image. Day 3 – SOC Analyst Journey with @Level_Effect 
Diving deeper into the system:

 🔹Used "icacls" to grant file/folder permissions
 🔹Monitored & terminated user processes via Task Manager

#SOC100 #BlueTeamSkills #WindowsSecurity
JesutofunmiAkan's tweet image. Day 3 – SOC Analyst Journey with @Level_Effect 
Diving deeper into the system:

 🔹Used "icacls" to grant file/folder permissions
 🔹Monitored & terminated user processes via Task Manager

#SOC100 #BlueTeamSkills #WindowsSecurity
JesutofunmiAkan's tweet image. Day 3 – SOC Analyst Journey with @Level_Effect 
Diving deeper into the system:

 🔹Used "icacls" to grant file/folder permissions
 🔹Monitored & terminated user processes via Task Manager

#SOC100 #BlueTeamSkills #WindowsSecurity


Mastered at @hackerspre30858 : 🛠️ Mimikatz, Rubeus, Impacket 🪟 Windows PrivEsc & AD Attacks ⚔️ C2 frameworks (Sliver, Mythic) 🧠 x86 internals, tokens, tickets Domain Admin in labs ✅ #RedTeam #OffSec #WindowsInternals #PayloadDev #HackersPrey


🎯 Ebyte-ETW-Redirector — Abusing Windows ETW to redirect event streams! 🔁 Hijack ETW providers & route output to custom consumers 🧪 Great for red team stealth, evasion, or detection bypass research 👉 github.com/EvilBytecode/E… #ETW #RedTeam #WindowsInternals


🛠️ TokenUniverse tool showcase: Admin to TrustedInstaller without spawning the service. #WindowsInternals #TokenUniverse github.com/diversenok/Tok…

diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…

Unlock forbidden Windows knowledge! 🤫💻 Find the PEB through truly undetected means and pop calculator 💥 The non-golf form will be available below 👇 #redteamtips #windowsinternals #rust

daaximus's tweet image. Unlock forbidden Windows knowledge! 🤫💻
Find the PEB through truly undetected means and pop calculator 💥
The non-golf form will be available below 👇

#redteamtips #windowsinternals #rust

My copy just arrived 😎 #WindowsInternals

Crovax4's tweet image. My copy just arrived 😎
#WindowsInternals

Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone. Windows Notification Facility FTW! #wnf #WindowsInternals

0gtweet's tweet image. Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone.
Windows Notification Facility FTW!
#wnf #WindowsInternals
0gtweet's tweet image. Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone.
Windows Notification Facility FTW!
#wnf #WindowsInternals

New video #WindowsInternals series: "Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more... Video: youtu.be/8oaEAPC84gc Walk-Through: git.io/JseF3

vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3

Be a regular user, face "Access Denied" when starting a system service, inject false ETW trigger to make it starting anyway. Fully working PoC for wersvc: github.com/gtworek/PSBits… #WindowsInternals #security

0gtweet's tweet image. Be a regular user, face "Access Denied" when starting a system service, inject false ETW trigger to make it starting anyway.

Fully working PoC for wersvc: github.com/gtworek/PSBits…

#WindowsInternals #security

Performance Counter Series #1 #WindowsInternals #Perfmon Counter Structure:

vagnerpilar's tweet image. Performance Counter Series #1 #WindowsInternals #Perfmon
Counter Structure:

@yarden_shafir “NPIEP is a fun drinking game where you have to say ‘non privileged instruction execution prevention’ and get a shot if you get it right, then try again. RUM is what I wish I had this morning before talking about hypervisor mitigations”. Yep, #WindowsInternals.

aionescu's tweet image. @yarden_shafir “NPIEP is a fun drinking game where you have to say ‘non privileged instruction execution prevention’ and get a shot if you get it right, then try again. RUM is what I wish I had this morning before talking about hypervisor mitigations”. Yep, #WindowsInternals.

Here is all actions that OS take before shutting down. #WindowsInternals

vagnerpilar's tweet image. Here is all actions that OS take before shutting down. #WindowsInternals

Tracing iSCSI on Windows Server 2016/2019 through "Event Trace Sessions" #WindowsInternals #Performance

vagnerpilar's tweet image. Tracing iSCSI on Windows Server 2016/2019 through "Event Trace Sessions" #WindowsInternals #Performance

Loading...

Something went wrong.


Something went wrong.


United States Trends