SubZero0x9 Profile Banner
Susan Ghosh Profile
Susan Ghosh

@SubZero0x9

Followers
614
Following
784
Media
8
Statuses
206

Security Analyst and Researcher. Trying very hard to figure out C, Assembly and Windows Internals. Eternal N00b.🐶

Instruction Pointer
Joined March 2018
Don't wanna be here? Send us removal request.
@SubZero0x9
Susan Ghosh
8 days
RT @TrainSec: 🎁 We’re giving away 1 FREE seat to our premium live workshop: “EDR Internals – Research & Development”!. 🔥 40+ hours of hands….
0
48
0
@SubZero0x9
Susan Ghosh
15 days
RT @elma_ios: I was messing around with symbol resolution in ELF and came up with an obfuscation technique on abusing symbol resolution in….
Tweet card summary image
blog.elmo.sg
This research shows how we can trick disassemblers and debuggers into identifying the wrong import names by messing up metadata used in the lazy binding process
0
41
0
@SubZero0x9
Susan Ghosh
28 days
RT @__mez0__: Under-the-hood, Ember uses LightGBM to score a sample from 0 to 1. I added this functionality into Citadel so any binaries ad….
Tweet card summary image
mez0.cc
Citadel 2.0: Predicting Maliciousness
0
14
0
@SubZero0x9
Susan Ghosh
2 months
RT @TKYNSEC: Windows 11 24H2 broke a popular malware evasion technique! The Lloyd Labs self-deletion method now fails because of NTFS chang….
0
107
0
@SubZero0x9
Susan Ghosh
2 months
RT @JonnyJohnson_: Have you ever wondered if there was a way to deploy a "Remote EDR"? Today I'm excited to share research I've been workin….
0
126
0
@SubZero0x9
Susan Ghosh
4 months
RT @AndrewOliveau: RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM….
Tweet card summary image
ibm.com
The IBM X-Force Red team covers the fundamentals of COM and DCOM, dives into the RunAs setting and why authentication coercions are impactful and introduces a new credential harvesting tool -...
0
178
0
@SubZero0x9
Susan Ghosh
4 months
RT @eversinc33: (1/x) For some reason people keep asking me how to get into reverse engineering. The obvious answer would be do CTFs or rev….
0
22
0
@SubZero0x9
Susan Ghosh
5 months
RT @ale_sp_brazil: The fifth article (57 pages) of the Exploiting Reversing Series (ERS) is available on:. I would….
0
102
0
@SubZero0x9
Susan Ghosh
5 months
RT @TrustedSec: In our new blog, Research Practice Lead @freefirex2 walks us through how to modify the system routing table when connecting….
Tweet card summary image
trustedsec.com
0
46
0
@SubZero0x9
Susan Ghosh
5 months
RT @taviso: You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. https://t….
Tweet card summary image
bughunters.google.com
This blog post covers the full details of EntrySign, the AMD Zen microcode signature validation vulnerability recently discovered by the Google Security team.
0
522
0
@SubZero0x9
Susan Ghosh
5 months
RT @dwizzzleMSFT: Awesome post from my team on VBS enclave security.
Tweet media one
0
54
0
@SubZero0x9
Susan Ghosh
5 months
RT @T3nb3w: 🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection. Leveraging STDFONT via IDispatch to inject into PPL….
Tweet card summary image
github.com
A C++ proof of concept demonstrating the exploitation of Windows Protected Process Light (PPL) by leveraging COM-to-.NET redirection and reflection techniques for code injection. This PoC showcases...
0
166
0
@SubZero0x9
Susan Ghosh
5 months
🚨 Hiring Alert 🚨.There is an open position for "Security Researcher - Windows Red Teaming" role in my team. Location: Delhi. Work Format: 5 days a week, WFO.Experience: 0-5 years. Refer the Image for the role overview and Skillset requirements. If you are eligible DM me.
Tweet media one
1
2
2
@SubZero0x9
Susan Ghosh
5 months
RT @Print3M_: 🚨 Hacking announcement 🚨 . Today I’m releasing SecTube 📺. Free collection of 500+ categorized videos from 20 IT security even….
Tweet card summary image
sectube.tv
The ultimate collection of IT security event recordings from around the world.
0
53
0