KillSwitchX7 Profile Banner
Kill Switch  Profile
Kill Switch 

@KillSwitchX7

Followers
2K
Following
26K
Media
378
Statuses
12K

Red Teamer and Threat Hunter | EDR Evasion | MalDev | ExpDev

/meow/
Joined January 2021
Don't wanna be here? Send us removal request.
@KillSwitchX7
Kill Switch 
4 years
Initially I faced issues searching for Cybersecurity relevant Discord servers, most of them were "native - user" based community servers, and often not active. The list below can skyrocket anyone who wishes to network and learn more via exploring different domains of Cybersec.
@KillSwitchX7
Kill Switch 
4 years
I have curated a long list of amazing discord servers which feature plentiful of domains in Cybersecurity, ranging from Threat Hunting & Incident response, penetration testing, bug bounties and so on.Feel free to join them!.
3
5
17
@KillSwitchX7
Kill Switch 
2 days
RT @itsalexvacca: Facebook once bought a VPN app for $120M and turned it into a surveillance tool that spied on 33M+ users' entire phones f….
0
26K
0
@KillSwitchX7
Kill Switch 
9 days
From the bottom of my heart, thank you so much @MalFuzzer , @zodiacon and @TrainSec academy team! ❤️ for considering me for this one of a kind training! . For folks who are still sitting on the fence, please don't hesitate considering this live training, it is &will be worth it.
@TrainSec
TrainSec Academy - Where pros train pros
9 days
Congratulations to @killswitchx7, winner of the free seat in our live EDR Internals - Research & Development live course!.Thanks to everyone who joined the giveaway and shared their stories. We selected the winner randomly from all valid entries. Early Bird pricing still open:.
0
2
11
@KillSwitchX7
Kill Switch 
12 days
RT @x33fcon: #x33fcon 2025 talks: @MhicRoibin - Unpacking the Unstoppable: How .Loaders Continue to Outwit AI, EDR, and Sandboxes > https:….
0
24
0
@KillSwitchX7
Kill Switch 
12 days
RT @netbiosX: A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting….
Tweet card summary image
github.com
A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to custom proxy. - EvilBytecode/Ebyte-ETW-Redirector
0
33
0
@KillSwitchX7
Kill Switch 
16 days
RT @MalFuzzer: 🚨 Win a FREE seat to our exclusive **EDR Internals, Research & Development** live online workshop! 🚀 Dive deep into EDR syst….
Tweet card summary image
trainsec.net
This hands-on workshop is designed to give cybersecurity professionals, malware researchers, and detection engineers a rare opportunity to explore how modern Endpoint Detection and Response (EDR)...
0
35
0
@KillSwitchX7
Kill Switch 
19 days
RT @NoMorePhis: #Tycoon2FA #Phishing .🐟38 Domains related to Tycoon2FA Phishing with Low Hits on vt: . Full List:….
Tweet card summary image
github.com
Repository with Domains Related to Tycoon2FA Phishing Infrastructure - NoMorePhish/Tycoon2FADomains
0
5
0
@KillSwitchX7
Kill Switch 
24 days
RT @d4rksystem: Ever since I was baby I've wanted speak or give a workshop at Defcon. This year I get to finally make that dream happen.….
0
15
0
@KillSwitchX7
Kill Switch 
24 days
RT @SEKTOR7net: Another way to circumvent ETW logging the SetThreadContext() calls - use NtContinue()/ZwContinue() instead. Calling thread….
0
31
0
@KillSwitchX7
Kill Switch 
24 days
RT @netbiosX: Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks….
Tweet card summary image
github.com
Proof-of-concept kernel driver that hijacks the Windows kernel extension table mechanism to preserve process notify callbacks even when attackers disable standard process notify callbacks. - Dor00t...
0
21
0
@KillSwitchX7
Kill Switch 
26 days
RT @r0keb: Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, interna….
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
0
135
0
@KillSwitchX7
Kill Switch 
1 month
RT @rad9800: I figured out a new way to **completely** disable certain EDR products only with Admin privileges in less than 30 lines of cod….
0
151
0
@KillSwitchX7
Kill Switch 
1 month
RT @Antonlovesdnb: Coming up on my 1 year anniversary with @HuntressLabs ! . Taking this opportunity to go over some things myself and the….
0
47
0
@KillSwitchX7
Kill Switch 
1 month
RT @Teach2Breach: 🔧 NT Unhooker - (PoC) A Windows security tool that detects & removes inline/IAT hooks from NTDLL.dll. .
Tweet card summary image
github.com
demo unhooking functions in ntdll. Contribute to Teach2Breach/nt_unhooker development by creating an account on GitHub.
0
25
0
@KillSwitchX7
Kill Switch 
2 months
RT @d1rkmtr: Very stealthy way of dumping LSASS, is done from the kernel, doesn't matter if LSASS is LSA Protected. Once loaded, the rootki….
0
52
0
@KillSwitchX7
Kill Switch 
2 months
RT @5mukx: Hiding In PlainSight - Proxying DLL Loads To Hide From ETWTI Stack Tracing.
Tweet media one
0
36
0
@KillSwitchX7
Kill Switch 
2 months
Big fat F you microsoft energy.
@I_Am_Jakoby
I am Jakoby
2 months
well i have something unfortunate to share.last night they gave my bounty an important rating, but marked it out of scope some how. all of this is just wildly dishonest. For one its not just information disclosure. I included and addendum that showed how to leak bearer tokens and
Tweet media one
0
0
1
@KillSwitchX7
Kill Switch 
2 months
RT @I_Am_Jakoby: well i have something unfortunate to share.last night they gave my bounty an important rating, but marked it out of scope….
0
37
0
@KillSwitchX7
Kill Switch 
2 months
RT @lbeurerkellner: 😈 BEWARE: Claude 4 + GitHub MCP will leak your private GitHub repositories, no questions asked. We discovered a new at….
0
494
0