
Adepts of 0xCC
@AdeptsOf0xCC
Followers
2K
Following
31
Media
46
Statuses
90
A brotherhood of owls praying to the debugger God. Press F7 to step into our prayers!
Joined April 2020
We hope our Fell(owl)ship is enjoying the summer! Time for beach/pool and a quick read of our new post by @TheXC3LL:. Mixing watering hole attacks with history leak via CSS.
0
19
27
Dear Fellowlship,. Our owl @TheXC3LL showed during the EuskalHack VII conclave a technique to achieve stability when overwriting the R/W/X memory in VBA. Read this addendum in our homily:
0
21
23
Dear Fell(owl)ship, we are experiencing a miracle. Two posts in our blog in the same month! This time @TheXC3LL's homily is about a product he pwned last xmas. A christmas tale: pwning GTB Central Console (CVE-2024-22107 & CVE-2024-22108).
1
21
43
Dear Fellowlship, new post in our blog. This time @TheXC3LL decided to start the year talking about VBA & macros (we would say "enjoy it", but is VBA so. You know. ):. VBA: having fun with macros, overwritten pointers & R/W/X memory.
0
31
58
H(owl) h(owl) h(owl)! We still alive and with holidays what means we have time to publish stuff! Check our last post by @TheXC3LL about lateral movements. Developers are juicy targets: DCOM & Visual Studio =>
1
21
38
RT @TheXC3LL: I already made a post in Sept 2022 explaining why this technique is not mature enough to be used in real environments, and thβ¦.
adepts.of0x.cc
Detecting NoVNC for phishing campaigns
0
3
0
RT @TheXC3LL: Since one of the bugs has been fixed, it's time to confess: I've been tracking and pwning Red Teams and script kiddies usingβ¦.
0
15
0
RT @SEKTOR7net: VBA and exports parsing without GetProcAddress() or NtQueryInformationProcess(), by @TheXC3LL. #redteam . .
adepts.of0x.cc
Combination of small snippets of code to simulate getprocaddress avoiding dangerous functions
0
55
0