gorploop
@G_Loop1
Followers
0
Following
3
Media
3
Statuses
8
'previewme.doc' looks like some kind of RedTeam exercise by @buffaloverflow CVE-2026-21509 exploit. https://t.co/uiuPkBjrol
1
11
87
'5_18_9_1328_03.02.2026.rar' seen from Ukraine as a CVE-2025-6218 and 8088 @abuse_ch
https://t.co/bjJgnKkKnh Domains: hxxps://be42.khlgj68234.workers(.)dev/ hxxps://awokent5.ease.workers(.)dev/ hxxps://mobx2i.inquiries.workers(.)dev/ @_CERT_UA
0
2
8
Exploiting an Off-By-One error using House Of Einherjar to gain chunk overlapping and arbitrary pointer return from malloc https://t.co/1dBGCZWvmw
0
0
0
Sample is now on VT! 🚩Hash: e4be95de21627b8f988ba9b55c34380c 🎯Actor name: Kimwolf 🔹Comment: October 24, 2025, a trusted partner in the security community provided us with a brand-new botnet sample. The most distinctive feature of this sample was its C2 domain,
blog.xlab.qianxin.com
Background On October 24, 2025, a trusted partner in the security community provided us with a brand-new botnet sample. The most distinctive feature of this sample was its C2 domain, 14emeliaterrac...
1
10
48
A simple but clever alternative to mimikatz Its been around for a while but i've only recently discovered it https://t.co/csBJEN2LhG
github.com
Windows active user credential phishing tool. Contribute to hlldz/pickl3 development by creating an account on GitHub.
0
0
0
A missing lock in a kernel driver is indistinguishable from valid code, until it crashes. We tracked down the fix for CVE-2024-23265 to see how Apple resolved a race condition in AppleDiskImages2. https://t.co/uVMsogIWpi See how we used Ghidra to locate the specific instruction
0
31
193
Writing lab detection shellcodes for Windows using C compiled assembly https://t.co/Xc7K1bX4CL
0
0
0
Understanding how App Bound Encryption work and ways to bypass it for credential stealing https://t.co/Ukd83mKYMq
0
0
0