#windowsinternals search results

🧠 Core Windows Architecture Understanding Windows Internals isn’t optional — it’s survival. 🔹 Kernel & User Mode 🔹 Processes & Threads 🔹 System Calls & Handles If you don’t know how Windows runs, you’ll never know how it breaks. #CyberSecurity #WindowsInternals

SOCDefender's tweet image. 🧠 Core Windows Architecture
Understanding Windows Internals isn’t optional — it’s survival.
🔹 Kernel & User Mode
🔹 Processes & Threads
🔹 System Calls & Handles
If you don’t know how Windows runs, you’ll never know how it breaks.
#CyberSecurity #WindowsInternals

Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss explains how they’re created, used, and abused - with live demos. 🎥Presentation: youtu.be/_ODdwpxXRR4?si… #Security #Pentest #WindowsInternals

compasssecurity's tweet image. Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss explains how they’re created, used, and abused -  with live demos.
🎥Presentation: youtu.be/_ODdwpxXRR4?si…

#Security #Pentest #WindowsInternals

👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2 🧠 Learn how to defeat: ✅ PowerShell Logging ✅ ETW ✅ SmartScreen ✅ MoTW ✅ C# Reflection ✅ More stealth tricks verylazytech.com/windows/antivi… #AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

verylazytech's tweet image. 👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2

🧠 Learn how to defeat:
✅ PowerShell Logging
✅ ETW
✅ SmartScreen
✅ MoTW
✅ C# Reflection
✅ More stealth tricks
verylazytech.com/windows/antivi…
#AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

Unlock forbidden Windows knowledge! 🤫💻 Find the PEB through truly undetected means and pop calculator 💥 The non-golf form will be available below 👇 #redteamtips #windowsinternals #rust

daaximus's tweet image. Unlock forbidden Windows knowledge! 🤫💻
Find the PEB through truly undetected means and pop calculator 💥
The non-golf form will be available below 👇

#redteamtips #windowsinternals #rust

Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

New video: Inside Windows Sessions with @zodiacon. Learn how Windows manages processes, desktops & security inside sessions. trainsec.net/library/window… #WindowsInternals #CyberSecurity #TrainSec

TrainSec's tweet image. New video: Inside Windows Sessions with @zodiacon.
Learn how Windows manages processes, desktops & security inside sessions.

trainsec.net/library/window…

#WindowsInternals #CyberSecurity #TrainSec

Excited to share that I’ve completed the Windows Internals training! A big thank to @TrainSec @zodiacon and everyone who contributed to this training. Looking forward to applying these insights in real-world scenarios! #WindowsInternals #CyberSecurity #Learning #WinDbg #Malware

PramodSalvi20's tweet image. Excited to share that I’ve completed the Windows Internals training!

A big thank to @TrainSec @zodiacon and everyone who contributed to this training. Looking forward to applying these insights in real-world scenarios!

#WindowsInternals #CyberSecurity #Learning #WinDbg #Malware

NTFS Alternate Data Streams (ADS) are a lesser-known feature that let you hide data inside files. Used for stealthy persistence, evasion, or covert storage (for example, to store payloads). Most tools — and users — completely overlook them. #CyberSecurity #DFIR #WindowsInternals

V4Valerius's tweet image. NTFS Alternate Data Streams (ADS) are a lesser-known feature that let you hide data inside files.
Used for stealthy persistence, evasion, or covert storage (for example, to store payloads).
Most tools — and users — completely overlook them.
#CyberSecurity #DFIR #WindowsInternals

¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_

EuskalHack's tweet image. ¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_

🧪 New technique: DreamWalkers A reflective shellcode loader that crafts a synthetic, clean call stack. Achieving stealthy execution from memory-mapped modules. 🔗 maxdcb.github.io/DreamWalkers/ #MalwareResearch #RedTeam #WindowsInternals #OffSec


Sharing is caring 🫶 Excellent write-up on MSRPC #exploitdevelopment. Clear breakdowns and great insights for anyone working in #WindowsInternals or offensive engineering. incendium.rocks/posts/Exploit-… From the #Hackcraft #RedTeaming team with love! #CyberSecurity #InfoSec #RedTeam


Windows memory management is one of the most critical areas of #WindowsInternals!❌ Watch @samilaiho bust some myths around it in this demo from our previous Advanced Windows Security Course 👉 youtube.com/watch?v=CBHYp3… #WindowsSecurity


Check it out and level up your skills: blog.dv08.in/blog/windows-p… one Windows process hack you've used? Drop it in the replies! #WindowsInternals #CyberSecurity #Programming #TechTips (Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

mindbender08's tweet image. Check it out and level up your skills: blog.dv08.in/blog/windows-p… 
one Windows process hack you've used? Drop it in the replies!  
#WindowsInternals #CyberSecurity #Programming #TechTips 

(Pro tip: Follow for more deep dives into AI, blockchain, and coding!)

Sometimes I crave learning on my own accord! Do you think that its going to be wasted effort? #WindowsInternals #WindowsAPI #Learning

SaraM67974's tweet image. Sometimes I crave learning on my own accord!
Do you think that its going to be wasted effort?
 #WindowsInternals #WindowsAPI #Learning

Enroll now for our 40-hour live workshop “EDR Internals: R&D,” co-taught with @MalFuzzer. Starts 23 Oct 2025. Dissect & build EDR drivers, master evasion techniques. Early-bird $1,450 ends 30 Sep. Details: trainsec.net/courses/edr-in… #EDR #WindowsInternals


Sharing is caring 🫶 Excellent write-up on MSRPC #exploitdevelopment. Clear breakdowns and great insights for anyone working in #WindowsInternals or offensive engineering. incendium.rocks/posts/Exploit-… From the #Hackcraft #RedTeaming team with love! #CyberSecurity #InfoSec #RedTeam


Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss explains how they’re created, used, and abused - with live demos. 🎥Presentation: youtu.be/_ODdwpxXRR4?si… #Security #Pentest #WindowsInternals

compasssecurity's tweet image. Want to understand how Windows handles authentication and access tokens? Security analyst @emanuelduss explains how they’re created, used, and abused -  with live demos.
🎥Presentation: youtu.be/_ODdwpxXRR4?si…

#Security #Pentest #WindowsInternals

So next time your debugger mentions “relocation table” or “base address,” just picture Windows moving books around on a crowded desk and rewriting their tables of contents so no chapters get lost. 🧠💻 #WindowsInternals #PE #ReverseEngineering #SystemsProgramming


🧠 Core Windows Architecture Understanding Windows Internals isn’t optional — it’s survival. 🔹 Kernel & User Mode 🔹 Processes & Threads 🔹 System Calls & Handles If you don’t know how Windows runs, you’ll never know how it breaks. #CyberSecurity #WindowsInternals

SOCDefender's tweet image. 🧠 Core Windows Architecture
Understanding Windows Internals isn’t optional — it’s survival.
🔹 Kernel & User Mode
🔹 Processes & Threads
🔹 System Calls & Handles
If you don’t know how Windows runs, you’ll never know how it breaks.
#CyberSecurity #WindowsInternals

New video: Inside Windows Sessions with @zodiacon. Learn how Windows manages processes, desktops & security inside sessions. trainsec.net/library/window… #WindowsInternals #CyberSecurity #TrainSec

TrainSec's tweet image. New video: Inside Windows Sessions with @zodiacon.
Learn how Windows manages processes, desktops & security inside sessions.

trainsec.net/library/window…

#WindowsInternals #CyberSecurity #TrainSec

6️⃣ Commit ≠ Working Set. Commit = memory apps asked for. Working Set = what’s in RAM now. High commit doesn’t mean “out of memory.” Check with RamMap. 📊 #WindowsInternals #Memory


3️⃣ 100% CPU but no clear culprit? 🔥 Run !runaway in WinDbg. 👉 Often it’s 1 runaway thread hogging cycles, not “the system.” #Debugging #WindowsInternals


1️⃣ Memory leaks ≠ high RAM usage. Windows caches memory aggressively. 🚀 👉 The real issue is Private Bytes climbing without release. Use PoolMon or WinDbg !vm. #WindowsInternals #Debugging


Just finished a new whitepaper: COMouflage – COM-based DLL Surrogate Injection I tested the technique against three major EDRs: - Microsoft Defender – bypassed - Palo Alto Cortex XDR – bypassed - SentinelOne – bypassed github.com/zero2504/COMou… #malware #COM #windowsinternals


Custom Windows shellcode leverages PEB and TEB structures for stealthy API resolution, dynamic payload control, and detection evasion. Encoding strings as hex keeps payloads self-contained and covert. #WindowsInternals #ShellcodeCraft #USA ift.tt/RukcYeH


و با نوشتن رول در #سوریکاتا، به شناسایی Signature در ترافیک دانلودی پرداختیم. در نهایت این بخش رو به PE Parser اضافه کردیم. مشاهده در یوتیوب: youtu.be/hr0WQaeNJdU?si… اسلاید و کدها: github.com/onhexgroup/Tut… #ویندوز_اینترنالز #WindowsInternals #redteam #Blueteam #PEParser #Lief

onhexgroup's tweet card. قسمت چهارم: NT Headers بخش Signature

youtube.com

YouTube

قسمت چهارم: NT Headers بخش Signature


"Contribute to Open Source Software with Me" Bblwrp — pronounced bubble wrap, as in “bubble wrap” or “insulate” your software. Join the fun: github.com/DesignsbyBlanc… #WindowsInternals #IT #Microsoft #opensourcesoftware #softwaredevelopement #programming #cplusplus


Windows memory management is one of the most critical areas of #WindowsInternals!❌ Watch @samilaiho bust some myths around it in this demo from our previous Advanced Windows Security Course 👉 youtube.com/watch?v=CBHYp3… #WindowsSecurity


Just published a article on my blog - Malware Development: 🧠 Process Injection - DLL, Shellcode 🔗 Read here: debug-diary.vercel.app/post/Process_I… Also added hand drawn images for better understanding #MalwareDevelopment #WindowsInternals #Cybersecurity

dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity
dk_dhruv_'s tweet image. Just published a article on my blog - Malware Development:
 🧠 Process Injection - DLL, Shellcode
 🔗 Read here: debug-diary.vercel.app/post/Process_I…
Also added hand drawn images for better understanding
#MalwareDevelopment #WindowsInternals #Cybersecurity

🛠️ TokenUniverse tool showcase: Admin to TrustedInstaller without spawning the service. #WindowsInternals #TokenUniverse github.com/diversenok/Tok…

diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…
diversenok_zero's tweet image. 🛠️ TokenUniverse tool showcase: 
Admin to TrustedInstaller without spawning the service.

#WindowsInternals #TokenUniverse
github.com/diversenok/Tok…

🧠 Core Windows Architecture Understanding Windows Internals isn’t optional — it’s survival. 🔹 Kernel & User Mode 🔹 Processes & Threads 🔹 System Calls & Handles If you don’t know how Windows runs, you’ll never know how it breaks. #CyberSecurity #WindowsInternals

SOCDefender's tweet image. 🧠 Core Windows Architecture
Understanding Windows Internals isn’t optional — it’s survival.
🔹 Kernel & User Mode
🔹 Processes & Threads
🔹 System Calls & Handles
If you don’t know how Windows runs, you’ll never know how it breaks.
#CyberSecurity #WindowsInternals

Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone. Windows Notification Facility FTW! #wnf #WindowsInternals

0gtweet's tweet image. Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone.
Windows Notification Facility FTW!
#wnf #WindowsInternals
0gtweet's tweet image. Yet another way of starting the WER Service: use undocumented NtUpdateWnfStateData() with 0x41940b3aa3bc0875 as a parameter. Allowed for anyone.
Windows Notification Facility FTW!
#wnf #WindowsInternals

New video #WindowsInternals series: "Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more... Video: youtu.be/8oaEAPC84gc Walk-Through: git.io/JseF3

vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3
vinopaljiri's tweet image. New video #WindowsInternals series:
"Tracing C function fopen [Part2] - Windbg Kernel Debugging - Walk-Through User-Mode to Kernel Executive Subsytem" and much more...

Video: youtu.be/8oaEAPC84gc
Walk-Through: git.io/JseF3

Be a regular user, face "Access Denied" when starting a system service, inject false ETW trigger to make it starting anyway. Fully working PoC for wersvc: github.com/gtworek/PSBits… #WindowsInternals #security

0gtweet's tweet image. Be a regular user, face "Access Denied" when starting a system service, inject false ETW trigger to make it starting anyway.

Fully working PoC for wersvc: github.com/gtworek/PSBits…

#WindowsInternals #security

My copy just arrived 😎 #WindowsInternals

Crovax4's tweet image. My copy just arrived 😎
#WindowsInternals

Performance Counter Series #1 #WindowsInternals #Perfmon Counter Structure:

vagnerpilar's tweet image. Performance Counter Series #1 #WindowsInternals #Perfmon
Counter Structure:

👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2 🧠 Learn how to defeat: ✅ PowerShell Logging ✅ ETW ✅ SmartScreen ✅ MoTW ✅ C# Reflection ✅ More stealth tricks verylazytech.com/windows/antivi… #AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

verylazytech's tweet image. 👀 Think AMSI bypass was wild? Wait until you see what’s in Part 2

🧠 Learn how to defeat:
✅ PowerShell Logging
✅ ETW
✅ SmartScreen
✅ MoTW
✅ C# Reflection
✅ More stealth tricks
verylazytech.com/windows/antivi…
#AVBypass #RedTeam #WindowsInternals #EDREvasion #OffSec #CyberSecurity

Here is all actions that OS take before shutting down. #WindowsInternals

vagnerpilar's tweet image. Here is all actions that OS take before shutting down. #WindowsInternals

Tracing iSCSI on Windows Server 2016/2019 through "Event Trace Sessions" #WindowsInternals #Performance

vagnerpilar's tweet image. Tracing iSCSI on Windows Server 2016/2019 through "Event Trace Sessions" #WindowsInternals #Performance

Loading...

Something went wrong.


Something went wrong.


United States Trends