
flux
@0xfluxsec
Followers
1K
Following
2K
Media
138
Statuses
535
Cyber professional (red team), security and systems programming | Rust | https://t.co/QIih2B7vya | https://t.co/VC3xsm0Wvq
Joined November 2023
Here it is: my research on Alternate Syscalls for Windows 11! There are still a few other facets to explore, but this is stable and PatchGuard resistant (from my tests!). #blueteam #redteam #computing #securityresearch #cyber #infosec #cybersec #malware.
4
52
167
Okay @Microsoft @msftsecurity @MSFTResearch #RIFT is pretty damn cool. But can it be ported to ghidra for us poor nerds who can’t afford IDA Pro 🤓.
www.microsoft.com
As threat actors are adopting Rust for malware development, RIFT, an open-source tool, helps reverse engineers analyze Rust malware, solving challenges in the security industry.
0
0
3
RT @d1rkmtr: Thinking about releasing initial access (bypass MotW & SmartScreen) framework just for bros, not that commercial free version….
0
11
0
RT @vxunderground: Dear Red Team nerds,. If you're curious what a successful and serious malware campaign looks like (if you want to make a….
www.zscaler.com
TransferLoader is a new malware family with sophisticated anti-analysis techniques that deploys embedded payloads that include a downloader, backdoor, and ransomware.
0
292
0
RT @TheHackersNews: 🔍 UPDATE: The Havoc backdoor used by Iranian hackers is far more advanced than we thought. Injected via conhost.dll, i….
thehackernews.com
Iranian threat actor Lemon Sandstorm accessed Middle East CNI from 2023–2025 using VPN flaws, web shells, and 8 custom tools.
0
129
0
RT @5mukx: Doppelganger: An Advanced LSASS Dumper with Process Cloning.
labs.yarix.com
Github Repo: https://github.com/vari-sh/RedTeamGrimoire/tree/main/Doppelganger What is LSASS? The Local Security Authority Subsystem Service (LSASS) is a core component of the Windows operating...
0
68
0
Yoooo nice work!.
Wrote a Windows kernel driver in Rust to read and write memory on request from a userland program, was pretty fun. I can recommend the Rust kernel Series from @0xfluxsec .
0
0
7
RT @xacone_: If you're exploiting a driver offering R/W access to physical memory on Win11 24H2, you can leverage this simple trick to circ….
0
54
0