ringzerø.training && @[email protected]
@_ringzer0
Followers
5K
Following
1K
Media
1K
Statuses
3K
Announcing Ringzer0 #COUNTERMEASURE25 - a premier cybersecurity training and conference event! Ottawa 🇨🇦 Nov 2025 ★ Registrations Open
Austin, TX
Joined January 2019
🚨 Ringzer0 Exclusive Webinar – Oct 2 🚨 Join researcher Marius Muench to uncover how hostile SIMs can be weaponized against networks & infrastructure. Featuring SIMurai platform insights. Free, limited seats! 👉 Register: https://t.co/Uze9T6IAvD
0
1
3
The Colonel’s Bequest – Case Cracked:
0
0
0
Behind the Schenes of a Chinese Phishing-As-A-Service: Lucid:
0
0
0
Bypassing Detections with Command-Line Obfuscation:
wietzebeukema.nl
Defensive tools like AVs and EDRs rely on command-line arguments for detecting malicious activity. This post demonstrates how command-line obfuscation, a shell-independent technique that exploits...
0
28
74
smugglo – Bypass Email Attachment Restrictions with HTML Smuggling:
github.com
smugglo - an easy to use script for wrapping files into self-dropping HTML payloads to bypass content filters - b3rito/smugglo
0
20
50
Analysis of the NSO BLASTPAST iMessage Exploit:
0
0
11
Emulating the YM2612: Part 1 - Interface:
0
0
3
Android Debugging with eBPF, Defying Anti-Debugging Barriers:
github.com
eBPF-based lightweight debugger for Android. Contribute to ShinoLeah/eDBG development by creating an account on GitHub.
0
33
165