
Kill Switch
@KillSwitchX7
Followers
2K
Following
26K
Media
378
Statuses
12K
Red Teamer and Threat Hunter | EDR Evasion | MalDev | ExpDev
/meow/
Joined January 2021
Initially I faced issues searching for Cybersecurity relevant Discord servers, most of them were "native - user" based community servers, and often not active. The list below can skyrocket anyone who wishes to network and learn more via exploring different domains of Cybersec.
I have curated a long list of amazing discord servers which feature plentiful of domains in Cybersecurity, ranging from Threat Hunting & Incident response, penetration testing, bug bounties and so on.Feel free to join them!.
3
5
17
RT @itsalexvacca: Facebook once bought a VPN app for $120M and turned it into a surveillance tool that spied on 33M+ users' entire phones f….
0
26K
0
RT @deadvolvo: This is a living document at the moment, but here it is for now. 😅As mentioned in the paper, if you….
blog.malicious.group
Most people think HTTP smuggling requires complex header tricks or broken protocol parsing. But sometimes, the most effective exploits aren’t based on complexity — they’re based on trust. In this...
0
64
0
From the bottom of my heart, thank you so much @MalFuzzer , @zodiacon and @TrainSec academy team! ❤️ for considering me for this one of a kind training! . For folks who are still sitting on the fence, please don't hesitate considering this live training, it is &will be worth it.
Congratulations to @killswitchx7, winner of the free seat in our live EDR Internals - Research & Development live course!.Thanks to everyone who joined the giveaway and shared their stories. We selected the winner randomly from all valid entries. Early Bird pricing still open:.
0
2
11
RT @x33fcon: #x33fcon 2025 talks: @MhicRoibin - Unpacking the Unstoppable: How .Loaders Continue to Outwit AI, EDR, and Sandboxes > https:….
0
24
0
RT @netbiosX: A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting….
github.com
A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to custom proxy. - EvilBytecode/Ebyte-ETW-Redirector
0
33
0
RT @netbiosX: An Arrow to the Heel: Abusing Default Machine Joining to Domain Permissions to Attack AWS Managed Active Directory https://t.….
permiso.io
Discover critical AWS Managed Active Directory security vulnerabilities enabling RBCD attacks via ms-ds-MachineAccountQuota. Learn mitigation strategies and detection methods for AWS Directory...
0
8
0
RT @MalFuzzer: 🚨 Win a FREE seat to our exclusive **EDR Internals, Research & Development** live online workshop! 🚀 Dive deep into EDR syst….
trainsec.net
This hands-on workshop is designed to give cybersecurity professionals, malware researchers, and detection engineers a rare opportunity to explore how modern Endpoint Detection and Response (EDR)...
0
35
0
RT @NoMorePhis: #Tycoon2FA #Phishing .🐟38 Domains related to Tycoon2FA Phishing with Low Hits on vt: . Full List:….
github.com
Repository with Domains Related to Tycoon2FA Phishing Infrastructure - NoMorePhish/Tycoon2FADomains
0
5
0
RT @d4rksystem: Ever since I was baby I've wanted speak or give a workshop at Defcon. This year I get to finally make that dream happen.….
0
15
0
RT @SEKTOR7net: Another way to circumvent ETW logging the SetThreadContext() calls - use NtContinue()/ZwContinue() instead. Calling thread….
0
31
0
RT @netbiosX: Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks….
github.com
Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when attackers disable standard process notify callbacks. - Dor00t...
0
21
0
RT @r0keb: Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, interna….
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
0
135
0
RT @rad9800: I figured out a new way to **completely** disable certain EDR products only with Admin privileges in less than 30 lines of cod….
0
151
0
RT @Antonlovesdnb: Coming up on my 1 year anniversary with @HuntressLabs ! . Taking this opportunity to go over some things myself and the….
0
47
0
RT @Teach2Breach: 🔧 NT Unhooker - (PoC) A Windows security tool that detects & removes inline/IAT hooks from NTDLL.dll. .
github.com
demo unhooking functions in ntdll. Contribute to Teach2Breach/nt_unhooker development by creating an account on GitHub.
0
25
0
RT @d1rkmtr: Very stealthy way of dumping LSASS, is done from the kernel, doesn't matter if LSASS is LSA Protected. Once loaded, the rootki….
0
52
0
Big fat F you microsoft energy.
well i have something unfortunate to share.last night they gave my bounty an important rating, but marked it out of scope some how. all of this is just wildly dishonest. For one its not just information disclosure. I included and addendum that showed how to leak bearer tokens and
0
0
1
RT @I_Am_Jakoby: well i have something unfortunate to share.last night they gave my bounty an important rating, but marked it out of scope….
0
37
0
RT @lbeurerkellner: 😈 BEWARE: Claude 4 + GitHub MCP will leak your private GitHub repositories, no questions asked. We discovered a new at….
0
494
0