Lloyd Davies
@LloydLabs
Followers
3K
Following
3K
Media
51
Statuses
674
founder @infrawatch_app
Scotland
Joined December 2017
New Research ๐ Process Injection via NtQueueApcThreadEx with NTDLL ROP Gadget 1. Pick random pop r32; ret gadget within NTDLL 2. The NtQueueApcThreadEx call will force the IP to ntdll.dll!<gadget> 3. Return into SystemArgument1 (our shellcode) ๐ -
github.com
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection. - GitHub - ...
9
131
345
As intelligence professionals our job is to abstract that away and present the reverent info, not dump raw disassembly as lazy analysis masquerading as technical depth.
0
0
20
Itโs 2025 and people are still plastering screenshots of IDA linear disassembly in writeups like itโs some medieval tapestry of forbidden knowledge. Itโs not inherently insightful, unless the semantics are completely unhinged or handwritten ๐
6
7
57
Hey @airesruy, please could you DM me? It is urgent and about your post on the Ubiquiti forum.
0
0
1
August 14th we posted this and mocked, sayiny it was probably North Korea. Some people (for reasons I don't understand) said it was probably safe (it's not) Thankfully, @infrawatch_app went way out there way to investigate the company mentioned in the Reddit post (DSLRoot) and
69
223
2K
Foreign-controlled proxy network "DSLRoot" has deployed hardware in 300+ U.S. homes across 20+ states-including military residences. Full investigation now live:
infrawatch.app
Detailed analysis of DSLRoot, a residential proxy network deploying hardware across U.S. homes, operated by a Belarusian national. Includes technical overview, network footprint, and operator...
3
35
126
Also see Brian's post here: https://t.co/qljAPY59WJ. This was a great collaboration which led us down new paths to investigate! ๐ค
krebsonsecurity.com
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd...
0
5
20
This research is finally out! What started as one forum post led us down a rabbit hole to uncover 300+ devices in U.S. homes-including an Air National Guard member's house. Brian's post can be found here:
krebsonsecurity.com
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd...
Foreign-controlled proxy network "DSLRoot" has deployed hardware in 300+ U.S. homes across 20+ states-including military residences. Full investigation now live:
0
5
15
What could go wrong..? ๐
0
0
4
New research Tuesday: How is a Belarus company convincing US military personnel to install network devices in their homes? Our investigation into DSLRoot reveals Americans are unknowingly helping foreign actors build proxy infrastructure on US soil.
2
72
509
https://t.co/GP3Tx2SHqk now works on Windows 11 24H2! ๐ฅณ
github.com
A way to delete a locked file, or current running executable, on disk. - LloydLabs/delete-self-poc
3
37
173
I'll be at @reconmtl next week in Montreal ๐จ๐ฆ if you're around, pop me a message!
0
1
7
Windows 11 24H2 broke a popular malware evasion technique! The Lloyd Labs self-deletion method now fails because of NTFS changes, so I spent time with kernel debugging to figure out why and how to fix it. Full technical breakdown:
7
105
334
As a Scottish resident, I applied for access to the .SCOT zone files via ICANN CZDS for legitimate security research. However, @dotscotregistry denied my request, while other registriesโincluding SU, RU, and CNโgranted access without issue. This lack of transparency does a
1
1
6
Infrawatch researchers explore GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, detailing its integration with LummaC2 and its command-and-control infrastructure. https://t.co/DoZUtb8d02
0
14
53
Today, I'm releasing the first version of a small web ๐: https://t.co/WZMsLWpGEK It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites. I hope it proves useful to some of you ... ๐โจ #ThreatIntel
17
123
372
"The lack of flexibility in traditional scanning products leaves organizations reliant on publicly available datasets, often waiting for others to decide what gets scanned and when." ๐๐ฅ
No more waiting on predefined scans from third-party tools. Customise probes, target specific IPv4/IPv6 ranges, ASNs, countries, or the entire ๐ - and act immediately. Probe deeper into the internet. ๐๐ป
0
0
2