TwoSevenOneT Profile Banner
Two Seven One Three Profile
Two Seven One Three

@TwoSevenOneT

Followers
4K
Following
832
Media
39
Statuses
210

Chief Security Officer (CSO) || Security Researcher at https://t.co/YsorB5YEAu || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer

Joined September 2024
Don't wanna be here? Send us removal request.
@TwoSevenOneT
Two Seven One Three
1 day
He should continue analyzing EDR-Redir, DefenderWrite, and IAmAntimalware πŸ˜…
@netbiosX
Panos Gkatziroulis πŸ¦„
2 days
Hunting for EDR-Freeze
0
2
10
@TwoSevenOneT
Two Seven One Three
3 days
When the marketing team hits the deadline πŸ™„
@blackorbird
blackorbird
4 days
I always thought this was a normal feature.πŸ˜… CVE-2025-9491 vulnerability exists in the way Windows handles .LNK (shortcut) files. Attackers can embed malicious command-line parameters in the "Target" field of the LNK file and pad them with spaces or other characters to hide
0
0
6
@hackyboiz
hackyboiz
6 days
[1day1line] CVE-2025-59287 Hello! Today’s 1day1line is about CVE-2025-59287 (RCE) in WSUS β€” an unauthenticated RCE affecting on-premises Windows Server Update Services. Check out the post! πŸ‘‡ https://t.co/ceQKf9hape
Tweet card summary image
hackyboiz.github.io
URL https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-59287 Target WSUSκ°€ μ„€μΉ˜ 및 ν™œμ„±ν™”λœ μ„œλ²„μ—λ§Œ 영ν–₯ Windows Server 2012 Windows Server 2012 R2 Windows Server 2016 Windows Server 2019 Windows...
1
7
35
@TwoSevenOneT
Two Seven One Three
6 days
Very fast πŸ‘
@0x534c
Steven Lim
6 days
πŸ§™β€β™‚οΈ Hunting EDR-Redir V2 with KQLWizard Magic Big shoutout to Zero Salarium @TwoSevenOneT for the creative twist on EDR-Redir V2 β€” it’s slick, evasive, and demands some serious wizardry to track. So the KQLWizard went back to the arcane scrolls and conjured a fresh KQL spell to
0
1
19
@TwoSevenOneT
Two Seven One Three
6 days
After testing with @Cameron21668376 EDR-Redir can run successfully with CrowdStrike Falcon πŸ”₯ #PenTesting GitHub: TwoSevenOneT/EDR-Redir
2
8
50
@TwoSevenOneT
Two Seven One Three
7 days
@Malwar3Ninja This is the V2 I mentioned earlier.
1
0
6
@TwoSevenOneT
Two Seven One Three
7 days
EDR-Redir V2 uses the bind link technique with the Program Files folder and creates a bind link for a folder that points to itself to break, bypass, and block Antivirus and EDR solutions. #itsecurity #redteam #pentest https://t.co/NKIOf3pc2R
Tweet card summary image
zerosalarium.com
EDR-Redir V2 uses bind link technique with Program Files folder. Create bind link for folder points to itself to break, bypass, block Antivirus, EDRs
1
9
31
@TwoSevenOneT
Two Seven One Three
7 days
EDR-Redir V2 can redirect entire folders like "Program Files" to point back to themselves, except for the folders of #antimalware EDR. This means that other software continues to function normally, while only the EDR is redirected or blocked. #itsecurity #redteam
4
32
169
@TwoSevenOneT
Two Seven One Three
8 days
EDR-Redir can successfully run with ESET. I will soon upgrade it to V2 with the ability to "redir" more types of EDRs. πŸ’ͺ GitHub: TwoSevenOneT/EDR-Redir #antimalware #CyberSecurity
3
34
183
@TwoSevenOneT
Two Seven One Three
10 days
Good news: EDR-Redir "bind" mode now can work with Windows 10 πŸ€“ https://t.co/PfCcG1xzmD
Tweet card summary image
github.com
EDR-Redir : a tool used to redirect the EDR's folder to another location. - TwoSevenOneT/EDR-Redir
2
29
109
@0x534c
Steven Lim
12 days
πŸ›‘οΈπŸ”— EDR-Redir: Breaking EDR with BindLink & Cloud Filter and how I detect it for MDE A new technique dubbed EDR-Redir from Zero Salarium shows how attackers can hijack or disable EDRs like Defender, Elastic, and Sophos by abusing Windows 11’s Bind Filter and Cloud Filter
0
39
112
@TwoSevenOneT
Two Seven One Three
13 days
Some EDR/Antivirus have been successfully tested Microsoft Windows Defender Elastic Defend Sophos Intercept X
1
2
18
@TwoSevenOneT
Two Seven One Three
13 days
EDR-Redir uses a Bind Filter (mini filter bindflt.sys) and the Windows Cloud Filter API (cldflt.sys) to redirect the Endpoint Detection and Response (EDR) 's working folder to a folder of the attacker's choice. https://t.co/7oDmOETdCA #itsecurity #redteam #pentest
Tweet card summary image
zerosalarium.com
EDR-Redir uses BindLink Filter and Windows Cloud Filter to inject, corrupt, and disable EDRs.
1
18
57
@TwoSevenOneT
Two Seven One Three
13 days
EDR-Redir: You can break EDRs/Antivirus from user mode with bind link and cloud minifilter. Because your payload deserves privacy. #antimalware #itsecurity #redteam
6
75
322
@SpecterOps
SpecterOps
15 days
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ‡️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
309
651
@TwoSevenOneT
Two Seven One Three
16 days
πŸ‘
@0x534c
Steven Lim
18 days
πŸ›‘ Detecting DefenderWrite Exploitation in Microsoft Defender for Endpoint https://t.co/CKMj8uU48q DefenderWrite (developed by Zero Salarium) is a penetration testing utility designed to identify and exploit whitelisted Windows executables, enabling arbitrary file writes within
0
2
15
@TwoSevenOneT
Two Seven One Three
20 days
By using brute-force and injecting into all available programs on Windows 11. DefenderWrite will help you identify which programs are allowed to write into the Antivirus's operating folder. https://t.co/YqI8Pwm5s8 #itsecurity #cybersecurity #redteam
Tweet card summary image
zerosalarium.com
DefenderWrite tool that helps find programs whitelisted by Antivirus and exploits these programs to write arbitrary files into the Antivirus's folder
0
14
43
@TwoSevenOneT
Two Seven One Three
20 days
#Windowsdefender allows certain special programs to write arbitrarily into its operating folder. I also tested with three other #antimalware products, and all of them had at least one Windows program whitelisted. GitHub: TwoSevenOneT/DefenderWrite #redteam
6
69
275
@TwoSevenOneT
Two Seven One Three
25 days
#IAmAntimalware vs BitDefender Antivirus, TrendMicro Antivirus+ #antimalware Github: TwoSevenOneT/IAmAntimalware #redteam
2
10
53
@TwoSevenOneT
Two Seven One Three
28 days
0
0
9