felixm_pw Profile Banner
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ Profile
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ

@felixm_pw

Followers
1K
Following
4K
Media
59
Statuses
1K

Senior Researcher @Sophos | https://t.co/rAj5k8LMif

πŸ‡¬πŸ‡§ United Kingdom
Joined May 2018
Don't wanna be here? Send us removal request.
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
5 months
With some guidance from @DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation πŸ’€ https://t.co/GpNQS6yMjl
Tweet card summary image
blog.felixm.pw
Dumping implants in a decrypted state
15
106
320
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
27 days
Question for people doing Windows dev on Macbooks. Are you using Azure VMs or are you using a physical NUC with Proxmox (etc). Curious what experiences people have had with both and which is recommended most 🧐
1
0
8
@C5pider
5pider
2 months
Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! https://t.co/0aPVihoFIU
Tweet card summary image
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
60
185
738
@DebugPrivilege
DebugPrivilege
4 months
Ever tried VSS tracing? I’ve been using it to troubleshoot Volume Shadow Copy issues. It’s super useful but not widely known, so I wrote a quick blog post about it.
Tweet card summary image
medium.com
When troubleshooting problems with Volume Shadow Copy Service (VSS) on Windows, event logs and error codes don’t always tell the full…
2
12
73
@Octoberfest73
Octoberfest7
4 months
Really cool work in this blog. My answer to the Time Travel Debugging problem attached. Using timers (Ekko) for sleep, add an additional one to check if the TTDRecordCPI.dll is loaded; if so force the process to crash so implant is never unmasked during the trace.
Tweet media one
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
5 months
With some guidance from @DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation πŸ’€ https://t.co/GpNQS6yMjl
2
15
75
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
5 months
This evening @DebugPrivilege walked me through some case studies from the WinDBG section of his debugging fundamentals repo. Defiantly check it out and bookmark it! https://t.co/pKxacSfU5X
Tweet card summary image
github.com
Hardcore Debugging. Contribute to DebugPrivilege/InsightEngineering development by creating an account on GitHub.
7
22
58
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
5 months
How it feels opening IDA
1
0
11
@eversinc33
eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆
7 months
I just finished writing the final part of my anti-anti-rootkit series, where I do a slight twist on the .data ptr hijacking IPC method, to create a "threadless" rootkit, concluding the trilogy :) Enjoy. https://t.co/GJzKqI6xDj
eversinc33.com
Hijacking .data ptrs to execute rootkit code
12
76
308
@eversinc33
eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆
9 months
It doesnt have to be RISC-V :) Wrote a little MIPS I VM (based on a playstation emulator I started writing years ago) that can execute MIPS compiled modules without the need for allocating additional executable memory
Tweet media one
5
11
91
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
10 months
WatchMojo Presents: Top 5 APT 🀑 Moments of 2024 All that effort for initial access just to use sam save and vssadmin πŸ’€ https://t.co/MUjrfybw5O
Tweet media one
0
0
8
@S0ufi4n3
Soufiane
1 year
The (Anti-)EDR Compendium EDR functionality and bypasses in 2024, with focus on undetected shellcode loader. https://t.co/5na8KcjqbV
2
69
233
@eversinc33
eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆
1 year
Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy! https://t.co/kxo34cIX4N
eversinc33.com
Detectin driver 'stomping' and hiding system threads by manipulating the PspCidTable.
10
113
304
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
Top 1% red teamer POV
@eversinc33
eversinc33 🀍πŸ”ͺβ‹†ο½‘Λš ⋆
1 year
Allright, post your BRC4 skins if you got them
Tweet media one
0
0
16
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
How many of you are down the bottom?πŸ’€
Tweet media one
14
115
599
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
POV: You pushed C-00000291*.sys on Friday and see a meeting with HR and Legal on Monday
0
1
4
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
CrowdStrike legal team are gonna be pulling out all the tricks to dodge the incoming lawsuits
0
0
8
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
Great talk about MacOS logic bugs by my friend Max!
@x33fcon
/ˈziːf-kΙ’n/
1 year
Tweet media one
0
0
3
@x33fcon
/ˈziːf-kΙ’n/
1 year
#Maldev - Packer Development is going strong in a #workshop at #x33fcon being taught by @ShitSecure and @eversinc33 - #redteam #blueteam
Tweet media one
Tweet media two
1
3
38
@felixm_pw
𝙁 𝙀 𝙇 𝙄 𝙓 π™ˆ
1 year
Just got linked this really awesome blog by @_vanvleet about Detection Data Models. This should be a valuable read for my Detection Engineering friends out there: https://t.co/l1GNHryHNo
Tweet card summary image
medium.com
In this post, I’ll present a simple approach to detection modeling and demonstrate how a Detection Data Model helps identify threats.
0
0
11