Dankitani Profile
Dankitani

@dankitan

Followers
43
Following
82
Media
1
Statuses
110

Joined November 2015
Don't wanna be here? Send us removal request.
@r0keb
ö
4 months
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. https://t.co/2KlYba9gxc
r0keb.github.io
Good morning! In today’s blog post we���re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
4
134
406
@ricnar456
Ricardo Narvaja
2 years
As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt. https://t.co/i7xPdZZono
Tweet card summary image
github.com
Contribute to fortra/CVE-2023-28252 development by creating an account on GitHub.
1
90
187
@rcx86
Mr. Rc
3 years
Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources that helped me along the way in the following tweets. Trust me, you won't be disappointed! 🧵 #infosec
96
610
2K
@ItsKieranDrew
Kieran Drew
3 years
Do you sit at a computer for longer than 6 hours a day? You’re destroying your body if so. Here’s the setup you need to protect yourself from posture problems and crippling long-term injuries: 🧵
1K
32K
137K
@hasherezade
hasherezade
3 years
My new paper for @MBThreatIntel: "#JSSLoader - the #shellcode edition" : https://t.co/gzpnhlr6mf // #FIN7
16
180
467
@CyberWarship
Florian Hansemann
4 years
"A practical guide to bypassing userland API Hooking" #redteam #infosec #pentest https://t.co/NslaCnzqGi
0
31
57
@binitamshah
Binni Shah
4 years
Shielder - Reversing embedded device bootloader (U-Boot) - Part 2 : https://t.co/1FmaWri1gG Part 1 : https://t.co/lbNABIXcFU
2
16
54
@relyze
Relyze
4 years
Pwning a Cisco RV340 with a 4 bug chain exploit:
0
73
186
@ptracesecurity
Ptrace Security GmbH
4 years
self-written exploits for all Nday vulnerabilities https://t.co/xVTVDSanG2 #Pentesting #Vulnerability #CyberSecurity #Infosec
0
33
48
@flopyash
hacksys
4 years
[Red Team] "Advanced Process Injection Techniques" Workshop is now LIVE ! Workshop Outline : PE Basics APC injection Module Stomping Process Hollowing Process Doppelgänging Transacted Hollowing Process Herpaderping Process Ghosting Code Repo : https://t.co/fAbJllCznw
1
153
371
@rcx86
Mr. Rc
4 years
Windows internals resources that I have collected in around an year #infosec Win32 programming with code examples: https://t.co/193gozDCgY Notes for Windows API programming; https://t.co/K5gcQZ8dUZ Windows undocumented functions' docs: https://t.co/LhHmRJ4T2R
9
189
479
@wrongbaud
wrongbaud
4 years
New blog series: Intro to Embedded RE Part 1: Tools and Series Overview https://t.co/gstsp9hWpB The next post releases on Friday, I'm looking forward to sharing this work with the community!
3
60
190
@elhackernet
elhacker.NET
4 years
Investigadores encuentran múltiples puertas traseras en el popular dispositivo VoIP fabricado por el fabricante alemán Auerswald ↘️CVE-2021-40859 -> CVSS 9.8 ↘️CVE-2021-40856 ↘️CVE-2021-40857 https://t.co/XhsIN9eIxq 🔁Actualizaciones firmware disponibles: https://t.co/zzkpfqBQZe
0
10
19
@SoumyadeepBas12
Soumyadeep Basu
4 years
Process injection via the KernelCallBackTable involves replacing original callback function by custom payload so that whenever the function is invoked, payload will be triggered. In this case the fnCOPYDATA callback function has been used. C# code snippet: https://t.co/X3Zx1cvcsK
3
134
371
@D00RT_RM
d00rt
4 years
Finally, we've released my last investigation on the recent attacks of #andariel #apt group. It covers the previous work done by @kaspersky @Malwarebytes and @KrCERT . Where we study the code reuse and evolution of #TigerRAT #TigerDownloader. Enjoy :) #malware
@threatray
Threatray
4 years
Check out our newest research on the Andariel APT group where we take a deep dive on the TigerDownloader and TigerRAT malware families. https://t.co/r4DK2FImxC #malware #apt #andariel #lazarus #threatintelligence
3
19
42
@ptracesecurity
Ptrace Security GmbH
4 years
Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s https://t.co/SAEHyLmNq3 #Hacking #ReverseEngineering #Infosec
1
27
82
@jstrosch
Josh Stroschein | The Cyber Yeti
4 years
Finally got around to adding training material from my #defcon 29 workshop "Modern Malware Analysis for Threat Hunters". 👉 https://t.co/0fCG2gDhii
4
112
332
@HusseiN98D
Hussein Daher
4 years
I will also giveaway 1 copy to a random person who retweetd this . 400 followers to go 🌟🌟🌟🌟🌟🌟🌟 #BugBounty
@HusseiN98D
Hussein Daher
4 years
Giveaway time! I will send 3 copies of my hacking workshop done at @THREAT_CON. That's +12 hours of content 🔥 ✅ Like 🔁 RT the post ✅ Follow 👉🏿 Giveaway ends at reaching 20k Followers 🌟
16
218
174
@HusseiN98D
Hussein Daher
4 years
Giveaway time! I will send 3 copies of my hacking workshop done at @THREAT_CON. That's +12 hours of content 🔥 ✅ Like 🔁 RT the post ✅ Follow 👉🏿 Giveaway ends at reaching 20k Followers 🌟
133
649
935