CyberCakeX Profile Banner
HotCakeX ✡︎ סגול Profile
HotCakeX ✡︎ סגול

@CyberCakeX

Followers
2K
Following
57K
Media
364
Statuses
2K

XX | Microsoft MVP | AppControl Manager Author & Harden Windows Security maintainer Check GitHub for info👇 https://t.co/0CY05HyAtH

Silent Hill
Joined September 2022
Don't wanna be here? Send us removal request.
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Just released new AppControl Manager update. ✅Reverse Code Integrity binaries (CIP) completely back to XML!.✅Brings the entire suite of App Control features on Home edition OS (not normally possible).✅Rust interop.#cyber #Windows #Redteam #CyberSecurity.
11
51
197
@CyberCakeX
HotCakeX ✡︎ סגול
10 days
I'm honored and super excited to be accepted as @Microsoft MVP for the 2nd year, this time in 2 new categories!! . Shoutout to @MVPAward and @BelaLior for accepting me in their community. ❤️🙏🏻. Been working on something big, will share more dits soon 😇💯.
Tweet media one
6
0
49
@CyberCakeX
HotCakeX ✡︎ סגול
24 days
fit check
Tweet media one
2
1
12
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
All WDAC does is allowing whatever You allow, you are in charge. Don't want vulnerable electron based apps to be exploited? Then don't allow them, simple as that. Also don't allow the entire store apps. Remember, default templates are good starting points but Not the strictest.
0
0
16
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Go to Microsoft Store, there are tens of thousands of apps. Find 1 vulnerability in any of them that allows you to run another program, exploit it. Does that mean you now bypassed WDAC? 🤪
Tweet media one
Tweet media two
Tweet media three
1
0
12
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Sorry but nothing is bypassed here. The blog post intentionally uses a WDAC policy that allows ALL store apps, ENTIRE Office suite, Teams and SO MUCH more. They find 1 vulnerability in electron-based app and claim they bypassed the "strictest" WDAC policy. You be the judge. 🤷‍♀️.
@chompie1337
chompie
2 months
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application.
11
3
121
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Bonus: The app can be set as default handler of App Control XML files and CIP Code Integrity files (they don't have any default opener). They get beautiful icons like the pics below. So you just need to double click on them and open them in the AppControl Manager's policy Editor.
Tweet media one
Tweet media two
Tweet media three
Tweet media four
0
0
10
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Also wrote this article explaining technical details of converting XML to CIP binary and reversing that process.
0
0
10
@CyberCakeX
HotCakeX ✡︎ סגול
2 months
Download it now from Microsoft Store. Source code available on GitHub. Community contribution and feedbacks are always welcome!.
1
0
11
@CyberCakeX
HotCakeX ✡︎ סגול
3 months
RT @Fahad__M__A: Definitely agree! @CyberCakeX 's style is as impressive as her abilities. 😉.Her apps and GitHub page are charming, with gr….
0
3
0
@CyberCakeX
HotCakeX ✡︎ סגול
3 months
Market dips are temporary.CyberSec girls are forever 💯
Tweet media one
3
0
20
@CyberCakeX
HotCakeX ✡︎ סגול
4 months
I heard from many people that they wanted Signed MSIX packages and now it's available. The app also can run without Admin privileges. Source code available on GitHub, also available through Winget + Documentation👇.
1
2
27
@CyberCakeX
HotCakeX ✡︎ סגול
4 months
I just published AppControl Manager to the Microsoft Store! 🎊✨.✅Signed and Verified.✅Now has Policy Editor.✅Secure your Client/Server for Free with the right and accurate tool. ✅Local + Intune + MDE Advanced Hunting. #CyberSecurity #Windows #redteam .
6
31
115
@CyberCakeX
HotCakeX ✡︎ סגול
4 months
RT @MVPAward: 🔐 Setting up WDAC rules? MVP @CyberCakeX breaks down rule types in this #MicrosoftLearn guide to help you secure your environ….
0
9
0
@CyberCakeX
HotCakeX ✡︎ סגול
7 months
There was a post that was retweeted by some folks that wrongly claimed that you can be clever and deploy an unsigned policy first so an attacker will fail to deploy their own policy, which is 100% false. Get the Correct information from the article above. Happy new year! 🤗.
1
1
10
@CyberCakeX
HotCakeX ✡︎ סגול
7 months
Wrote this today about countermeasures against abuse of App Control policies to blind EDRs. Also talk about.✅Tamper resistant signed policies.✅ TCG Storage encryption.✅A big chart of offensive/defensive actions. #Cyber #Windows #CyberSecurity #Defender.
4
62
240
@CyberCakeX
HotCakeX ✡︎ סגול
7 months
Looking for technical documentation about how the app was built? How secure it is? Which URLs it uses? List of all the features it offers? Source code? Check out this document. Have any questions? Reach out on GitHub or X. #Windows #Security #WDAC .
0
1
8
@CyberCakeX
HotCakeX ✡︎ סגול
7 months
Also recorded a 40mins video demoing the app. It has more features now since i recorded it. I go over all the details and also mention lots of useful information about Application control for business in Windows. make sure to check it out. #cybersecurity .
1
1
19
@CyberCakeX
HotCakeX ✡︎ סגול
7 months
Made new app: AppControl Manager.✅Modern GUI.✅Powerful defensive tool.✅Manage Code Integrity in Windows.✅Decide which apps run in your OS.✅Create policy for remote systems (Intune).✅MDE Advanced Hunting support.✅more. #Cyber #Windows #cybersecurity.
6
58
266
@CyberCakeX
HotCakeX ✡︎ סגול
8 months
RT @dwizzzleMSFT: "Administrator protection introduces a new security boundary with our support to fix any reporte….
0
65
0