LloydLabs Profile Banner
Lloyd Davies Profile
Lloyd Davies

@LloydLabs

Followers
3K
Following
3K
Media
51
Statuses
674

founder @infrawatch_app

Scotland
Joined December 2017
Don't wanna be here? Send us removal request.
@LloydLabs
Lloyd Davies
3 years
New Research ๐Ÿ‘‰ Process Injection via NtQueueApcThreadEx with NTDLL ROP Gadget 1. Pick random pop r32; ret gadget within NTDLL 2. The NtQueueApcThreadEx call will force the IP to ntdll.dll!<gadget> 3. Return into SystemArgument1 (our shellcode) ๐Ÿ”— -
Tweet card summary image
github.com
This novel way of using NtQueueApcThreadEx by abusing the ApcRoutine and SystemArgument[0-3] parameters by passing a random pop r32; ret gadget can be used for stealthy code injection. - GitHub - ...
9
131
345
@LloydLabs
Lloyd Davies
30 days
As intelligence professionals our job is to abstract that away and present the reverent info, not dump raw disassembly as lazy analysis masquerading as technical depth.
0
0
20
@LloydLabs
Lloyd Davies
30 days
Itโ€™s 2025 and people are still plastering screenshots of IDA linear disassembly in writeups like itโ€™s some medieval tapestry of forbidden knowledge. Itโ€™s not inherently insightful, unless the semantics are completely unhinged or handwritten ๐Ÿ™ƒ
6
7
57
@LloydLabs
Lloyd Davies
1 month
Hey @airesruy, please could you DM me? It is urgent and about your post on the Ubiquiti forum.
0
0
1
@vxunderground
vx-underground
3 months
August 14th we posted this and mocked, sayiny it was probably North Korea. Some people (for reasons I don't understand) said it was probably safe (it's not) Thankfully, @infrawatch_app went way out there way to investigate the company mentioned in the Reddit post (DSLRoot) and
69
223
2K
@infrawatch_app
Infrawatch
3 months
Foreign-controlled proxy network "DSLRoot" has deployed hardware in 300+ U.S. homes across 20+ states-including military residences. Full investigation now live:
Tweet card summary image
infrawatch.app
Detailed analysis of DSLRoot, a residential proxy network deploying hardware across U.S. homes, operated by a Belarusian national. Includes technical overview, network footprint, and operator...
3
35
126
@LloydLabs
Lloyd Davies
3 months
This research is finally out! What started as one forum post led us down a rabbit hole to uncover 300+ devices in U.S. homes-including an Air National Guard member's house. Brian's post can be found here:
Tweet card summary image
krebsonsecurity.com
The cybersecurity community on Reddit responded in disbelief this month when a self-described Air National Guard member with top secret security clearance began questioning the arrangement they'd...
@infrawatch_app
Infrawatch
3 months
Foreign-controlled proxy network "DSLRoot" has deployed hardware in 300+ U.S. homes across 20+ states-including military residences. Full investigation now live:
0
5
15
@LloydLabs
Lloyd Davies
3 months
What could go wrong..? ๐Ÿ™ƒ
@GithubProjects
GitHub Projects Community
3 months
Open-source Free Domain For Everyone.
0
0
4
@LloydLabs
Lloyd Davies
3 months
When times were simpler ๐Ÿ˜‡
@ovtracker
ovtracker
5 years
๐Ÿ“Š Visualisation of observed #Qakbot (#Qbot) C2s between affiliates in the past week ๐Ÿ’ป - 6 affiliates seen ๐ŸŒ - 306 unique C2s seen
0
0
5
@infrawatch_app
Infrawatch
3 months
New research Tuesday: How is a Belarus company convincing US military personnel to install network devices in their homes? Our investigation into DSLRoot reveals Americans are unknowingly helping foreign actors build proxy infrastructure on US soil.
2
72
509
@LloydLabs
Lloyd Davies
5 months
I'll be at @reconmtl next week in Montreal ๐Ÿ‡จ๐Ÿ‡ฆ if you're around, pop me a message!
0
1
7
@TKYNSEC
TKYN
5 months
Windows 11 24H2 broke a popular malware evasion technique! The Lloyd Labs self-deletion method now fails because of NTFS changes, so I spent time with kernel debugging to figure out why and how to fix it. Full technical breakdown:
7
105
334
@LloydLabs
Lloyd Davies
9 months
As a Scottish resident, I applied for access to the .SCOT zone files via ICANN CZDS for legitimate security research. However, @dotscotregistry denied my request, while other registriesโ€”including SU, RU, and CNโ€”granted access without issue. This lack of transparency does a
1
1
6
@virusbtn
Virus Bulletin
9 months
Infrawatch researchers explore GhostSocks, a Golang-based SOCKS5 backconnect proxy malware, detailing its integration with LummaC2 and its command-and-control infrastructure. https://t.co/DoZUtb8d02
0
14
53
@viql
Johannes Bader
10 months
Today, I'm releasing the first version of a small web ๐Ÿš€: https://t.co/WZMsLWpGEK It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites. I hope it proves useful to some of you ... ๐Ÿ™โœจ #ThreatIntel
17
123
372
@LloydLabs
Lloyd Davies
10 months
"The lack of flexibility in traditional scanning products leaves organizations reliant on publicly available datasets, often waiting for others to decide what gets scanned and when." ๐Ÿ‘€๐Ÿ”ฅ
@infrawatch_app
Infrawatch
10 months
No more waiting on predefined scans from third-party tools. Customise probes, target specific IPv4/IPv6 ranges, ASNs, countries, or the entire ๐ŸŒŽ - and act immediately. Probe deeper into the internet. ๐Ÿ‘‰๐Ÿป
0
0
2