AliceCliment Profile Banner
Alice Climent-Pommeret Profile
Alice Climent-Pommeret

@AliceCliment

Followers
3K
Following
3K
Media
333
Statuses
2K

Malware and EDR stuff @harfanglab 🤓 || PTC || Sister of @h313n_0f_t0r & @lauriewired || https://t.co/fqvyNQ57ET

xchg eax, eax
Joined November 2018
Don't wanna be here? Send us removal request.
@AliceCliment
Alice Climent-Pommeret
3 years
Curious about what's happening in the Windows Kernel after a Syscall? . I just wrote this post following the worfkflow from the Syscall instruction to the target kernel routine ⬇️. Thanks again to @Set_hyx for the proofreading!.
4
249
574
@AliceCliment
Alice Climent-Pommeret
5 months
🤩🔥🔥🔥🤩.
@artem_i_baranov
Artem I. Baranov 🐦
7 months
Windows Rootkits and Bootkits Guide is available in an eye-friendly design and colors 🕶️🎆🎄
Tweet media one
0
0
1
@AliceCliment
Alice Climent-Pommeret
5 months
a registry key, they are able to remove any AV/EDR on a Windows machine. BYOVD Style ( but without interacting directly with the driver though 😅). If I found the time I'll write a blog post about this vuln.
0
0
3
@AliceCliment
Alice Climent-Pommeret
5 months
without any tools. The PoC is using the driver indirectly (via specificaly crafted data in registry keys) to remove ANY files or registry keys after a reboot. So yes, it adds new capabilities for the attackers to damage the system. Because with just the driver load and data in.
1
1
2
@AliceCliment
Alice Climent-Pommeret
5 months
related registry keys. Even with administrator privileges on a machine, you usually (if the AV/EDR is a good one and/or correctly configured) can't remove essential files and registry keys related to the agent. If so any attacker with admin priv would be able to shoot AV/EDR.
1
0
2
@AliceCliment
Alice Climent-Pommeret
5 months
I just realized something. The advisory says:. "This issue does not add additional capabilities to an attacker with administrative privileges to damage the attacked system.". Well, that's not true. The PoC allows an attacker to remove EDR/AV files (exe, dll, drivers) and.
@AliceCliment
Alice Climent-Pommeret
5 months
The vulnerability I've found last year in @kaspersky AV is nows patched 🥳.
2
0
14
@AliceCliment
Alice Climent-Pommeret
5 months
@kaspersky *now.
0
0
3
@AliceCliment
Alice Climent-Pommeret
5 months
The vulnerability I've found last year in @kaspersky AV is nows patched 🥳.
5
12
80
@AliceCliment
Alice Climent-Pommeret
6 months
RT @5mukx: SassyKitdi: Kernel Mode TCP Sockets + LSASS Dump.
Tweet media one
0
45
0
@AliceCliment
Alice Climent-Pommeret
7 months
RT @Unit42_Intel: #HeartCrypt, a new #PaaS, packs malicious code with legitimate binaries. Advertised on Telegram and elsewhere, the low co….
0
15
0
@AliceCliment
Alice Climent-Pommeret
7 months
✨💅🔥.
@CEFCYS_Officiel
CEFCYS
7 months
🏆 Femme Cyber Espoir - FRANCE. 👏 Bravo à Joséphine DELAS pour avoir reçu le trophée de Femme Cyber Espoir, décerné par Frédérique LEBRUN ! Votre talent remarquable et votre engagement dans le domaine de la cybersécurité tracent la voie de l’avenir ! 🌟🏆.#ecwd
Tweet media one
Tweet media two
0
0
3
@AliceCliment
Alice Climent-Pommeret
8 months
RT @BlackInCyberCo1: 🚀Contribute to our organization as we provide tools for success, development cohorts and infrastructure for community….
0
9
0
@AliceCliment
Alice Climent-Pommeret
8 months
RT @YoursSto: @BrHackeuses are finally on Twitter❤️‍🔥Don't hesitate to follow their account to keep up with the community's activities and….
0
3
0
@AliceCliment
Alice Climent-Pommeret
9 months
The loudest sound in the universe
Tweet media one
0
0
1
@AliceCliment
Alice Climent-Pommeret
9 months
RT @lauriewired: Think of it like ordering a pizza. MOV is like ordering a pizza and receiving the actual pizza itself, whereas LEA is like….
0
3
0
@AliceCliment
Alice Climent-Pommeret
9 months
🤩😍🤩.
@momo5502
Maurice Heumann
9 months
My Windows User Space Emulator is now open source. Feel free to check out out ⬇️.
0
0
3
@AliceCliment
Alice Climent-Pommeret
9 months
0
0
0
@AliceCliment
Alice Climent-Pommeret
9 months
🥹🥹🥹
1
0
2
@AliceCliment
Alice Climent-Pommeret
9 months
A new blog post just dropped!. If you want to know more about malicious code-signing certificate hunt go check it out!. A special S/O to @securechicken and @ArielJT for the proofreading!.
Tweet card summary image
harfanglab.io
Our telemetry has revealed a significant increase in Lumma Stealer malware deployments via the HijackLoader malicious loader.
1
26
71