Bilal Profile
Bilal

@0xcc00

Followers
606
Following
56
Media
10
Statuses
56

Writing buggy code

Joined July 2021
Don't wanna be here? Send us removal request.
@ZacksJerryRig
JerryRigEverything
1 month
She was in international waters and then kidnapped by Israel. Where are those "don't tread on me" guys at?
@AdameMedia
ADAM
1 month
🚨 “My name is Greta Thunberg . I'm a citizen of Sweden. If you are watching this video, I have been abducted and taken against my will by Israeli forces.. Please tell my government to demand my and the others' immediate release.” JUSTICE FOR GRETA https://t.co/sg5p8Dq4LI
752
5K
43K
@amasad
Amjad Masad
1 month
Many are asking if they can move their Next.js projects from Vercel to Replit? Yes! - Go to Import then GitHub - enter repo URL - Agent will take care of the rest It will set up the dev and deployment environments! For companies moving lots of work, happy to help + discount.
368
2K
15K
@hacker_ralf
HackerRalf
2 months
AdaptixC2 v0.9 is out! https://t.co/mL8AAS83TK * New dock-based client * Public Web-API * New BOFs in Extension-Kit Full changelog: https://t.co/9dlUFMQ8wU
7
55
311
@wikileaks
WikiLeaks
3 months
Israel murders five journalists in targeted airstrike in Gaza. Al Jazeera journalists Anas al-Sharif and Mohammed Qreiqea, and camera operators Ibrahim Zaher, Mohammed Noufal, and Moamen Aliwa have been killed in a targeted Israeli airstrike. Two weeks ago, UN Special
773
7K
17K
@Shammahwoods
Ezra Woods
3 months
@hardc1dr @al3x_n3ff @0xcc00 As Alex stated, it doesn't actually "read" the file in that way, but I do think this should be easy enough for vendors to build detections for based on raw disk reading alone. I tested this with a top 5 EDR and it did not alert, even with dumping the extracted files to disk..
0
1
3
@0xcc00
Bilal
4 months
You can now even dump LSA/SAM hashes from normal Windows machines using -o TARGET flag.
@al3x_n3ff
Alex Neff
4 months
Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀
1
53
279
@0xcc00
Bilal
4 months
My module “ntds_dump_raw” is now out in NetExec🔥 Can’t wait for your feedback.
@al3x_n3ff
Alex Neff
4 months
Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀
1
0
22
@GazaMartyrs
‏Martyrs of Gaza
4 months
“I want to eat because I haven’t eaten for five days” Don’t ignore her voice. she’s still hungry!
281
6K
11K
@0xcc00
Bilal
4 months
I've been playing with MCP, Releasing AdaptixC2_mcp a PoC that exposes Adaptix-C2 APIs to gemini-cli, enabling it to control a beacon and to simulate a threat actor behavior. Code: https://t.co/ewqGuES5z4
1
2
19
@0xcc00
Bilal
5 months
The new AI tool from google (Gemini-cli) performs impressively well. Here, I made it perform a simple internal penetration test by having it control a C2 beacon (Sliver) through an MCP server, and gave it access to Netexec and Hashcat I may write a blog about it if I continue it
0
1
5
@vxunderground
vx-underground
6 months
Drama++ The United States government is using a fork of Signal called "TM SGNL". TM SGNL is (likely) produced by an Israeli firm (Smarsh) which is (or related to in some capacity) the Israel Defense Forces' Intelligence unit. Although these claims are based on self-described
27
193
1K
@MuhammadSmiry
Muhammad Smiry 🇵🇸
7 months
THIS SCHOOL WAS BOMBED TODAY BY lSRAEL AT LEAST 30 PALESTINIANS KILLED MOST OF THEM ARE CHILDREN.
54
2K
3K
@Fudgedotdotdot
Fudge...
9 months
Inspired by @0xcc00, writing a quick and dirty program to extract files directly from a NTFS volume was a great way to continue learning Nim. It's very much a POC. Here's the link: https://t.co/AtmkKjpFFX
1
3
6
@0xcc00
Bilal
11 months
New quick article, Hiding behind the library line - Go malware development It's about exploring a technique of hiding your malicious code inside Go libraries to mislead analysts and reverse engineers. link:
Tweet card summary image
medium.com
I was working on a reverse engineering challenge from the famous Flare-On CTF when I had an idea about injecting code into native…
2
7
17
@0xcc00
Bilal
1 year
I'm considering integrating it as a NetExec module instead of keeping it as a standalone tool, but I'll need to clean up the code first since it's a bit of a spaghetti mess right now. Previous article :
0
4
36
@0xcc00
Bilal
1 year
I've been working for a while on turning the technique I mentioned in my last article into a standalone tool, which also gave me an excuse to dig into the NTFS file system. I’ve just finished a POC that extracts ntds.dit, SAM and SYSTEM files directly from the hard disk.
5
19
164
@ajplus
AJ+
1 year
Israel got away with violating international law in Gaza. Now it’s following the same playbook in Lebanon.
61
947
1K
@0xcc00
Bilal
1 year
My article has been added to @vxunderground 🔥
@vxunderground
vx-underground
1 year
We've updated the vx-underground Windows malware paper collection. We have a lot more papers in queue. Read them. Papers: - 2024-08-31 - Finding open file handles in PS - 2024-08-30 - Evil MSI A story about vulnerabilities in MSI Files - 2024-08-26 - DLL Sideloading ith
0
1
3
@tastefullysaucy
inqilāb
1 year
I will never forget the boy that carried the remains of his brother in a backpack, or the woman who refused to wash the blood of her children off her hands because that was all she had left of them, or the girl that recognized her mother by her hair. Never forget, never forgive.
61
24K
50K