GuidedHacking Profile Banner
GuidedHacking Profile
GuidedHacking

@GuidedHacking

Followers
35,787
Following
318
Media
1,915
Statuses
5,391

Reverse Engineering, Game Hacking, Malware Analysis & Exploit Development @

USA
Joined January 2013
Don't wanna be here? Send us removal request.
Explore trending content on Musk Viewer
Pinned Tweet
@GuidedHacking
GuidedHacking
5 months
🚨Con Presentations by Guided Hacking Members The Underground World of Anti-Cheats From @niemand_sec at Black Hat Europe 2019 👉 1/10
Tweet media one
1
28
112
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
203
7K
@GuidedHacking
GuidedHacking
8 months
🚨Squally Has Finally Left Early Access! 📚New Patch Contains 4 New Chapters 🎮Learn Game Hacking with this 2D Puzzle RPG 🛠 It teaches the basics of assembly, binary & hex 🕵Buy it on Steam or bundled with a GH subscription 🔗
0
435
6K
@GuidedHacking
GuidedHacking
1 year
Squally is an x86 assembly puzzle game in early access made by @zcanann . You complete quests and beat enemies by solving assembly puzzles. Support the project by picking up a copy:
0
251
4K
@GuidedHacking
GuidedHacking
8 months
0
438
4K
@GuidedHacking
GuidedHacking
5 months
🔥Squally - The Game That Teaches Assembly 🛠 Learn the Basics of x86, binary & hexadecimal 🕵Buy it on Steam or bundled with a GH subscription 👉
0
162
3K
@GuidedHacking
GuidedHacking
7 months
Tweet media one
0
45
2K
@GuidedHacking
GuidedHacking
1 year
Steam Anti-Debug Stack Spray - When a debugger is detected they just blow up the stack to force a crash.
1
197
2K
@GuidedHacking
GuidedHacking
3 years
Our game hacking book, Game Hacking Fundamentals, made by @Erarnitox is now available for sale here:
Tweet media one
Tweet media two
Tweet media three
Tweet media four
67
252
1K
@GuidedHacking
GuidedHacking
2 months
Tweet media one
0
202
1K
@GuidedHacking
GuidedHacking
2 months
Tweet media one
0
77
852
@GuidedHacking
GuidedHacking
15 days
Tweet media one
0
72
806
@GuidedHacking
GuidedHacking
1 year
x86 assembly One language to rule them all, One language to find them, One language to bring them all and in the darkness bind them
Tweet media one
0
32
730
@GuidedHacking
GuidedHacking
1 year
ChatGPT was only trained on 500GB of data DARPA had AI running on a quantum computer, with access to Google's 666 petabyte database 9 years ago It's already nuked Earth, our reality is just a simulation running on a a moon base docker server whose solar panels haven't died yet
1
77
704
@GuidedHacking
GuidedHacking
3 months
Tweet media one
0
108
651
@GuidedHacking
GuidedHacking
9 months
"I got banned for no reason" the no reason in question:
Tweet media one
0
67
607
@GuidedHacking
GuidedHacking
18 days
Tweet media one
0
61
598
@GuidedHacking
GuidedHacking
2 years
UVB-76, a Russian military radio channel used for covert communication for the past 40 years, was hijacked by radio pirates who began playing Gangnam style and displaying memes last week. It's still happening, I captured this image today
Tweet media one
0
143
578
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
45
580
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
86
568
@GuidedHacking
GuidedHacking
2 years
Game hacking tutorials before & after I took over
Tweet media one
Tweet media two
1
46
543
@GuidedHacking
GuidedHacking
10 months
🔍Unknown high-score malware in Triage reports 💻Elevation: admin privileges, firewall changes 🌐Network : insecure php c2 - open dir 📦Loader: hidden window & file DL 📝Data: encoded browser data extraction 🔮RDP tunneling via ngrok, new Win user 🔗
Tweet media one
0
52
549
@GuidedHacking
GuidedHacking
1 year
me after 1 sip of beer at the company party
0
73
476
@GuidedHacking
GuidedHacking
10 months
🚀Join us as we complete @cyberdefenders RE101 📚6 Challenges for Beginner Malware Analysts 🔍Extracting Encrypted Flags 🔓Decoding in CyberChef 🔧Fixing file headers 🔎Used a debugger to find a flag 🔐Xor Encrypted Strings 🔗
Tweet media one
0
50
493
@GuidedHacking
GuidedHacking
1 month
Tweet media one
0
57
471
@GuidedHacking
GuidedHacking
16 days
Tweet media one
0
39
451
@GuidedHacking
GuidedHacking
16 days
Tweet media one
0
55
448
@GuidedHacking
GuidedHacking
1 year
Decompiler Explorer is pretty neato
Tweet media one
0
89
438
@GuidedHacking
GuidedHacking
14 days
Tweet media one
0
62
442
@GuidedHacking
GuidedHacking
11 months
0
17
430
@GuidedHacking
GuidedHacking
1 year
I dropped a USB stick in their parking lot with ValorantBypass.exe on it and they opened it lmaoo
@riotgames
Riot Games
1 year
Earlier this week, systems in our development environment were compromised via a social engineering attack. We don’t have all the answers right now, but we wanted to communicate early and let you know there is no indication that player data or personal information was obtained.
302
626
10K
1
18
411
@GuidedHacking
GuidedHacking
1 year
bypassing anticheat is harder than bypassing EDR infosec is cucked by cheat engine users your entire industry is a joke
0
59
386
@GuidedHacking
GuidedHacking
3 months
🚨Writing Exploits for IoT N-Days The amazing @_stigward has blessed our channel with another excellent video, this time exploiting a Zyxel NAS. 🥇Analyzing CVE-2023-35138 🥈Reversing the Firmware 🥉Developing the Exploit 👉
Tweet media one
0
60
406
@GuidedHacking
GuidedHacking
1 year
0
19
373
@GuidedHacking
GuidedHacking
8 months
🔍 Unpacking Ramnit's Custom Packer 🎬 Tutorial demonstrates the steps in 7 mins 🔧 Open in IDA, find encrypted code, attach debugger 🕵️‍♀️ Keep an eye on VirtualAlloc, inspect copied files 💡 Suspended svchost -> process injection 🔗
Tweet media one
0
48
377
@GuidedHacking
GuidedHacking
7 months
Tweet media one
0
62
369
@GuidedHacking
GuidedHacking
8 months
0
19
369
@GuidedHacking
GuidedHacking
9 months
🛠️Reverse Engineering 🕵️Malware Analysis 🕹️Game Hacking 🛠️Exploit Development 🔗
0
51
358
@GuidedHacking
GuidedHacking
1 year
We've now been told for the 4th time, that our reverse engineering content is better than SANS601. SANS is $8000 Our courses are $5/month Stop sending your interns to SANS, drop them a fiver and spend the other $7995 on hookers & blow like a real CISO.
Tweet media one
0
31
347
@GuidedHacking
GuidedHacking
6 months
the birth of Steam
Tweet media one
0
30
340
@GuidedHacking
GuidedHacking
1 year
Part 5 of our Exploit Development Series Learn How to Bypass DEP with WriteProcessMemory
Tweet media one
0
78
338
@GuidedHacking
GuidedHacking
8 months
💾 Unpacking Gootkit Malware 🔍 Using IDA Pro, x64dbg for Analysis 🏦 Gootkit - Banking Trojan from 2019 🔐 Find & Identify XOR Cipher 🐍 Python Script For String Decryption 🚧 Bypasses Defender, UAC via WMIC 🔗
Tweet media one
0
20
332
@GuidedHacking
GuidedHacking
5 months
The 5 Best IDA Pro Plugins​ for Malware Analysis 👉
Tweet media one
0
23
354
@GuidedHacking
GuidedHacking
3 years
If you want to learn reverse engineering, you need to understand it takes thousands of hours to get good at. And even when you're an expert, it can take hundreds of hours in a disassembler to actually achieve a task. People are incredibly naïve about how time consuming it is.
5
72
338
@GuidedHacking
GuidedHacking
1 year
Exploit Development 4 - DEP Bypass
Tweet media one
0
71
325
@GuidedHacking
GuidedHacking
8 months
0
30
313
@GuidedHacking
GuidedHacking
9 months
📣 Shoutout to @fr3dhk for a phenomenal year of developing top-notch Malware Analysis tutorials. 📚 39 video tutorials covering a wide range of topics, all listed below with many more on the way! 👇Find them all here free on YouTube: 🔗
Tweet media one
0
44
312
@GuidedHacking
GuidedHacking
8 months
Tweet media one
0
38
307
@GuidedHacking
GuidedHacking
6 months
hackers who have never defended, will never understand how stupid they look in the logs
0
36
305
@GuidedHacking
GuidedHacking
2 years
send me 500 bitcoin or I will open and close your CD-ROM tray repeatedly
Tweet media one
0
34
298
@GuidedHacking
GuidedHacking
3 years
Soon we can fix the bugs in Cyberpunk ourselves, noice
@vxunderground
vx-underground
3 years
CD Projekt Red's ransomed data has been leaked online.
Tweet media one
113
847
3K
2
58
285
@GuidedHacking
GuidedHacking
3 years
This list is only 70% of the content I have produced. Stop whining and start grinding.
Tweet media one
0
32
284
@GuidedHacking
GuidedHacking
1 year
This infosec professional said our Game Hacking Bible is better than a $6,000 training his employer sent him to.
Tweet media one
0
30
285
@GuidedHacking
GuidedHacking
1 year
Practice your anti-debug skills with the GH DebugMe
Tweet media one
0
63
289
@GuidedHacking
GuidedHacking
8 months
🔐 DEP Bypass with WriteProcessMemory 🛠️Exploit Development Course: Chapter 5 🛑 Bypassing stack protection 🧠 Writing the ROP chain 🕵️ Finding code caves & more 🔗
Tweet media one
0
39
283
@GuidedHacking
GuidedHacking
8 months
👀 SysInternals Tools for Malware Analysis 💻 ProcMon lists system operations in real-time 🚀 AutoRuns identifies persistence 📚 Sysmon logs low-level system activities 🔒 SigCheck verifies binary integrity 👥 PsExec executes remote processes 🔗
Tweet media one
0
67
285
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
26
276
@GuidedHacking
GuidedHacking
3 months
Want to learn reverse engineering? @herrcore makes some of the best videos available, this playlist covers many practical skills and you will always learn some valuable insight or tip even if you are familiar with the topic already. 👉
Tweet media one
0
68
285
@GuidedHacking
GuidedHacking
5 months
🕵️Detecting Sus Threads with Memory Checks 💡 Strategies for Evading Thread Detection ➡️
Tweet media one
0
20
273
@GuidedHacking
GuidedHacking
7 months
👾Bypassing ASLR - Exploit Dev Chapter 8 📚Read/write primitive for ASLR bypass 🛠 Use ws2_32!recv for initial analysis 🔍Ghidra for reversing recv() behavior 💡 Identify remote buffer size 📊Get control over RCX & RAX 🔗
Tweet media one
0
54
269
@GuidedHacking
GuidedHacking
11 months
🐧 Exploit Dev 11: Intro to Linux Exploiting 🔓 The 11th chapter just released on our website! 🏁 Perfect for CTFs & real-world scenarios 🔗 Join us & learn from the experts 👉
Tweet media one
1
55
271
@GuidedHacking
GuidedHacking
3 months
🤔
1
49
272
@GuidedHacking
GuidedHacking
1 year
A simple & practical introduction to Undocumented Windows Internals. Learn about NtQueryInformationProcess, the PEB and how to parse the module list. Internal, External, x86 & x64 examples.
Tweet media one
0
69
267
@GuidedHacking
GuidedHacking
11 months
Exploit Development 8 - How to Bypass ASLR For those of you following our Exploit Dev course, the latest video has been released on our website.
Tweet media one
0
50
262
@GuidedHacking
GuidedHacking
8 months
Tweet media one
0
29
261
@GuidedHacking
GuidedHacking
2 years
🔥↘️Guided Hacking ↙️ 🔥 ✅Game Hacking Bible ☑️CS420 Game Hacking Course ✅Game Hacking Shenanigans ☑️Python Game Hacking Course ✅Python Reverse Engineering
1
80
247
@GuidedHacking
GuidedHacking
7 months
1. game crashes 2. 40,000 people with the same bug on Steam 3. no solutions available online 4. reverse engineer it, find bug & patch it in 5 minutes 5. email company with solution 6. company ignores email welp, I tried
0
18
248
@GuidedHacking
GuidedHacking
2 months
Tweet media one
0
23
248
@GuidedHacking
GuidedHacking
1 year
Throwback to 2015 Everything required to make this hack from scratch is explained in EXTREME DETAIL in our Game Hacking Bible. We don't teach you how to combine libraries, pastes, offset dumps and public information. We actually teach you the skills to be independent.
1
22
243
@GuidedHacking
GuidedHacking
1 year
The 1989 release of Prince of Persia represented a significant advancement in the realm of anti-debug. To prevent crackers from bypassing copy protections the game used multiple anti-debug methods. Self-Debugging is a common technique. Learn here:
Tweet media one
0
37
237
@GuidedHacking
GuidedHacking
3 years
another gem
Tweet media one
13
19
241
@GuidedHacking
GuidedHacking
11 months
🔍Hunting Malware C2s - Video Walkthrough 🛠️Understand C2 panels with ViriBack C2 Tracker 🎯Explore non-HTTP C2s via ThreatFox 🌐Find C2s with Censys, Shodan & URLScanIO 🔗
Tweet media one
1
58
234
@GuidedHacking
GuidedHacking
2 months
Tweet media one
0
21
237
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
26
226
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
20
224
@GuidedHacking
GuidedHacking
1 year
0
23
221
@GuidedHacking
GuidedHacking
1 year
Success Story A high school kid with no experience, follows our tutorials very diligently for 2 years. He gets an interview at a game development company, they are so impressed with his skills that they hire him on the spot as a Software Engineer. Total investment: $20
0
13
220
@GuidedHacking
GuidedHacking
9 months
🚨 🚨 🔥Game Hacking Courses 🕵️Malware Analysis Tutorials 👀Exploit Development Course 🛠️THM & HTB Walkthroughs 📚Python Reverse Engineering 🕹️Android Hacking Tutorials 😎Java Reverse Engineering
0
41
213
@GuidedHacking
GuidedHacking
8 months
🖥️ Set up Flare-VM for Malware Analysis 🔑 Start with fresh Windows 10 in VirtualBox 📥 Run FLARE VM script to grab RE tools 🧰 Add IDA Pro, portable UwAmp & Fiddler 🐠 Use Paranoid Fish to test sandbox detection 🛡️ Patch more leaks with VBoxCloak 🔗
Tweet media one
0
31
212
@GuidedHacking
GuidedHacking
3 months
Tweet media one
0
31
209
@GuidedHacking
GuidedHacking
11 months
Tweet media one
0
26
207
@GuidedHacking
GuidedHacking
1 year
If you don't know about these "same hash recompilation" projects, they're completely insane. They reverse the games so perfectly that the hashes match when they compile them, using 20 year old build chains. Insanely cool
@lethal_guitar
Nikolai Wuttke-Hohendorf
2 years
Duke Nukem II's source code was never published, and seems to be lost. I reverse engineered a lot of it for RigelEngine, but not all of it. And Rigel's code is fairly different. Enter my latest project: . Compiles into a 100%-identical DOS binary! (thread)
13
211
798
0
37
209
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
27
201
@GuidedHacking
GuidedHacking
2 months
🍎 MacOS Game Hacking with Rust-Lang 👨‍💻 Learn How To Use the Mach Kernel API 🛠️ Bit Slicer = MacOS Cheat Engine Alternative 🧠 Best Crates for MacOSX Memory Manipulation 💻 Learn How to Manipulate Game Memory ✨ Develop and test a basic Rust trainer 👉
Tweet media one
0
29
210
@GuidedHacking
GuidedHacking
4 months
🚨Bug Spotting in Video Games ☑️CVE Analysis, Patch Analysis & Code Review ✅CVE-2020-14938 = Heap-based Buffer Overflow ☑️CVE-2020-14939 = Arbitrary Code Execution ⭐️Were the patches sufficient? Let's find out! 🔗
Tweet media one
0
34
200
@GuidedHacking
GuidedHacking
11 months
Guided Hacking is an amazing resource, for those who understand it's true purpose & treat it with respect. - 10 courses - 1,300 tutorials - 430 videos We have thousands of satisfied customers & we are improving our catalog of content every day.
0
30
199
@GuidedHacking
GuidedHacking
1 year
0
18
199
@GuidedHacking
GuidedHacking
5 months
🕵️Exploit Development 9 - Intro to Linux Exploits 👉
Tweet media one
0
27
191
@GuidedHacking
GuidedHacking
5 months
💯 Guided Hacking Injector v4.8 💯 1⃣ Added Mono Injection ✅ 2⃣ Added Injection from memory ✅ 3⃣ Lots of bug fixes & improvements ✅ 👉
Tweet media one
0
19
197
@GuidedHacking
GuidedHacking
8 months
🧮 Virtual Address Translation 💽 4-stage process using PML4, PDPT, PDT, PT 🖥️ Facilitates smooth process isolation 🔍 Maps virtual to physical memory 📚 Page table is the translation key 🔑 Implements MMU in hardware 💾 Swaps pages for efficient use 🔗
Tweet media one
0
24
191
@GuidedHacking
GuidedHacking
1 year
We just released our Java Reverse Engineering Series. Java Game Hacking Series to be released next month.
0
54
191
@GuidedHacking
GuidedHacking
3 years
Tweet media one
2
16
194
@GuidedHacking
GuidedHacking
8 months
0
29
189
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
23
182
@GuidedHacking
GuidedHacking
2 months
0
24
187
@GuidedHacking
GuidedHacking
3 months
lmao
Tweet media one
0
17
183
@GuidedHacking
GuidedHacking
1 year
Guided Hacking is better than a $8000 training? This is not the first time we've been told this Our service is only $40 per year
Tweet media one
0
13
177
@GuidedHacking
GuidedHacking
1 year
Tweet media one
0
19
172
@GuidedHacking
GuidedHacking
4 months
Tweet media one
0
12
177
@GuidedHacking
GuidedHacking
8 months
Top 5 Best Twitch Streamers 1. @herrcore 2. @herrcore 3. @herrcore 4. @herrcore 5. @herrcore
1
26
172