AdeptsOf0xCC Profile Banner
Adepts of 0xCC Profile
Adepts of 0xCC

@AdeptsOf0xCC

Followers
2K
Following
31
Media
46
Statuses
90

A brotherhood of owls praying to the debugger God. Press F7 to step into our prayers!

Joined April 2020
Don't wanna be here? Send us removal request.
@AdeptsOf0xCC
Adepts of 0xCC
4 months
RT @TheXC3LL: New doormat πŸ’œ
Tweet media one
0
1
0
@AdeptsOf0xCC
Adepts of 0xCC
7 months
Our owl Mario just published a small VM to generate application-layer protocols. Define your protocol from scratch with opcodes! .
0
8
19
@AdeptsOf0xCC
Adepts of 0xCC
1 year
We hope our Fell(owl)ship is enjoying the summer! Time for beach/pool and a quick read of our new post by @TheXC3LL:. Mixing watering hole attacks with history leak via CSS.
0
19
27
@AdeptsOf0xCC
Adepts of 0xCC
1 year
Dear Fellowlship,. Our owl @TheXC3LL showed during the EuskalHack VII conclave a technique to achieve stability when overwriting the R/W/X memory in VBA. Read this addendum in our homily:
0
21
23
@AdeptsOf0xCC
Adepts of 0xCC
1 year
RT @TheXC3LL: You can find my slides for "Offensive VBA" talk here
Tweet media one
0
133
0
@AdeptsOf0xCC
Adepts of 0xCC
1 year
πŸ¦‰
Tweet media one
Tweet media two
0
2
6
@AdeptsOf0xCC
Adepts of 0xCC
1 year
RT @Heksiah: It's always a pleasure to work with you 😊.
0
1
0
@AdeptsOf0xCC
Adepts of 0xCC
1 year
We are alive! We hope you like our new design for 2024 πŸ¦‰. Thanks @Heksiah !
Tweet media one
0
4
21
@AdeptsOf0xCC
Adepts of 0xCC
1 year
Spotted an owl reference at OffensiveCon πŸ₯³πŸ¦‰
Tweet media one
0
1
14
@AdeptsOf0xCC
Adepts of 0xCC
2 years
Dear Fell(owl)ship, we are experiencing a miracle. Two posts in our blog in the same month! This time @TheXC3LL's homily is about a product he pwned last xmas. A christmas tale: pwning GTB Central Console (CVE-2024-22107 & CVE-2024-22108).
1
21
43
@AdeptsOf0xCC
Adepts of 0xCC
2 years
Dear Fellowlship, new post in our blog. This time @TheXC3LL decided to start the year talking about VBA & macros (we would say "enjoy it", but is VBA so. You know. ):. VBA: having fun with macros, overwritten pointers & R/W/X memory.
0
31
58
@AdeptsOf0xCC
Adepts of 0xCC
2 years
H(owl) h(owl) h(owl)! We still alive and with holidays what means we have time to publish stuff! Check our last post by @TheXC3LL about lateral movements. Developers are juicy targets: DCOM & Visual Studio =>
1
21
38
@AdeptsOf0xCC
Adepts of 0xCC
2 years
Woot Woot πŸ¦‰πŸ¦‰πŸ¦‰.
@TheXC3LL
X-C3LL
2 years
Moar ink!!
Tweet media one
0
1
3
@AdeptsOf0xCC
Adepts of 0xCC
2 years
We are at that *secret place* πŸŒ΄πŸ”΄πŸŒ΄. If you want stickers, let us know. Or just approach the guy with the Adepts T-shirt . πŸ¦‰πŸ¦‰
Tweet media one
0
3
16
@AdeptsOf0xCC
Adepts of 0xCC
2 years
RT @TheXC3LL: I already made a post in Sept 2022 explaining why this technique is not mature enough to be used in real environments, and th….
Tweet card summary image
adepts.of0x.cc
Detecting NoVNC for phishing campaigns
0
3
0
@AdeptsOf0xCC
Adepts of 0xCC
2 years
RT @TheXC3LL: Since one of the bugs has been fixed, it's time to confess: I've been tracking and pwning Red Teams and script kiddies using….
0
15
0
@AdeptsOf0xCC
Adepts of 0xCC
2 years
RT @TheXC3LL: There will be owl stickers too πŸ‘€
Tweet media one
0
1
0
@AdeptsOf0xCC
Adepts of 0xCC
2 years
A naughty owl in Las Vegas πŸ‘€
Tweet media one
0
3
20
@AdeptsOf0xCC
Adepts of 0xCC
2 years
RT @SEKTOR7net: VBA and exports parsing without GetProcAddress() or NtQueryInformationProcess(), by @TheXC3LL. #redteam . .
Tweet card summary image
adepts.of0x.cc
Combination of small snippets of code to simulate getprocaddress avoiding dangerous functions
0
55
0
@AdeptsOf0xCC
Adepts of 0xCC
2 years
Tweet media one
0
0
6