Dankitani
@dankitan
Followers
43
Following
82
Media
1
Statuses
110
Joined November 2015
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. https://t.co/2KlYba9gxc
r0keb.github.io
Good morning! In today’s blog post we���re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
4
134
406
As promised, the research on CVE-2023-28252 is already published with its PoC and the detailed explanation of the reversing that we did with my friend @solidclt. https://t.co/i7xPdZZono
github.com
Contribute to fortra/CVE-2023-28252 development by creating an account on GitHub.
1
90
187
Do you sit at a computer for longer than 6 hours a day? You’re destroying your body if so. Here’s the setup you need to protect yourself from posture problems and crippling long-term injuries: 🧵
1K
32K
137K
My new paper for @MBThreatIntel: "#JSSLoader - the #shellcode edition" : https://t.co/gzpnhlr6mf // #FIN7
16
180
467
"A practical guide to bypassing userland API Hooking" #redteam #infosec #pentest
https://t.co/NslaCnzqGi
0
31
57
Shielder - Reversing embedded device bootloader (U-Boot) - Part 2 : https://t.co/1FmaWri1gG Part 1 : https://t.co/lbNABIXcFU
2
16
54
self-written exploits for all Nday vulnerabilities https://t.co/xVTVDSanG2
#Pentesting #Vulnerability #CyberSecurity #Infosec
0
33
48
Insane amount of good quality resources 👏 https://t.co/k8K7iipJxI
github.com
Resources for Windows exploit development. Contribute to FULLSHADE/WindowsExploitationResources development by creating an account on GitHub.
0
4
4
[Red Team] "Advanced Process Injection Techniques" Workshop is now LIVE ! Workshop Outline : PE Basics APC injection Module Stomping Process Hollowing Process Doppelgänging Transacted Hollowing Process Herpaderping Process Ghosting Code Repo : https://t.co/fAbJllCznw
1
153
371
Windows internals resources that I have collected in around an year #infosec Win32 programming with code examples: https://t.co/193gozDCgY Notes for Windows API programming; https://t.co/K5gcQZ8dUZ Windows undocumented functions' docs: https://t.co/LhHmRJ4T2R
9
189
479
New blog series: Intro to Embedded RE Part 1: Tools and Series Overview https://t.co/gstsp9hWpB The next post releases on Friday, I'm looking forward to sharing this work with the community!
3
60
190
Investigadores encuentran múltiples puertas traseras en el popular dispositivo VoIP fabricado por el fabricante alemán Auerswald ↘️CVE-2021-40859 -> CVSS 9.8 ↘️CVE-2021-40856 ↘️CVE-2021-40857 https://t.co/XhsIN9eIxq 🔁Actualizaciones firmware disponibles: https://t.co/zzkpfqBQZe
0
10
19
Process injection via the KernelCallBackTable involves replacing original callback function by custom payload so that whenever the function is invoked, payload will be triggered. In this case the fnCOPYDATA callback function has been used. C# code snippet: https://t.co/X3Zx1cvcsK
3
134
371
Finally, we've released my last investigation on the recent attacks of #andariel #apt group. It covers the previous work done by @kaspersky @Malwarebytes and @KrCERT . Where we study the code reuse and evolution of #TigerRAT #TigerDownloader. Enjoy :) #malware
Check out our newest research on the Andariel APT group where we take a deep dive on the TigerDownloader and TigerRAT malware families. https://t.co/r4DK2FImxC
#malware #apt #andariel #lazarus #threatintelligence
3
19
42
Hacking the dlink DIR-615 for fun and no profit Part 5: Multiple RCE’s https://t.co/SAEHyLmNq3
#Hacking #ReverseEngineering #Infosec
1
27
82
Finally got around to adding training material from my #defcon 29 workshop "Modern Malware Analysis for Threat Hunters". 👉 https://t.co/0fCG2gDhii
4
112
332
I will also giveaway 1 copy to a random person who retweetd this . 400 followers to go 🌟🌟🌟🌟🌟🌟🌟 #BugBounty
Giveaway time! I will send 3 copies of my hacking workshop done at @THREAT_CON. That's +12 hours of content 🔥 ✅ Like 🔁 RT the post ✅ Follow 👉🏿 Giveaway ends at reaching 20k Followers 🌟
16
218
174
Giveaway time! I will send 3 copies of my hacking workshop done at @THREAT_CON. That's +12 hours of content 🔥 ✅ Like 🔁 RT the post ✅ Follow 👉🏿 Giveaway ends at reaching 20k Followers 🌟
133
649
935