
π π π π π π
@felixm_pw
Followers
1K
Following
4K
Media
59
Statuses
1K
Senior Researcher @Sophos | https://t.co/rAj5k8LMif
π¬π§ United Kingdom
Joined May 2018
With some guidance from @DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation π€ https://t.co/GpNQS6yMjl
blog.felixm.pw
Dumping implants in a decrypted state
15
106
320
Question for people doing Windows dev on Macbooks. Are you using Azure VMs or are you using a physical NUC with Proxmox (etc). Curious what experiences people have had with both and which is recommended most π§
1
0
8
Announcing our whitepaper on the future of endpoint security. https://t.co/NogsQiku9B
preludesecurity.com
A research preview of our user-mode Windows agent that comprehensively catches malicious code execution.
6
86
285
Introducing Havoc Professional: A Lethal Presence Weβre excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! https://t.co/0aPVihoFIU
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
60
185
738
Ever tried VSS tracing? Iβve been using it to troubleshoot Volume Shadow Copy issues. Itβs super useful but not widely known, so I wrote a quick blog post about it.
medium.com
When troubleshooting problems with Volume Shadow Copy Service (VSS) on Windows, event logs and error codes donβt always tell the fullβ¦
2
12
73
Really cool work in this blog. My answer to the Time Travel Debugging problem attached. Using timers (Ekko) for sleep, add an additional one to check if the TTDRecordCPI.dll is loaded; if so force the process to crash so implant is never unmasked during the trace.
With some guidance from @DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation π€ https://t.co/GpNQS6yMjl
2
15
75
This evening @DebugPrivilege walked me through some case studies from the WinDBG section of his debugging fundamentals repo. Defiantly check it out and bookmark it! https://t.co/pKxacSfU5X
github.com
Hardcore Debugging. Contribute to DebugPrivilege/InsightEngineering development by creating an account on GitHub.
7
22
58
I just finished writing the final part of my anti-anti-rootkit series, where I do a slight twist on the .data ptr hijacking IPC method, to create a "threadless" rootkit, concluding the trilogy :) Enjoy. https://t.co/GJzKqI6xDj
eversinc33.com
Hijacking .data ptrs to execute rootkit code
12
76
308
It doesnt have to be RISC-V :) Wrote a little MIPS I VM (based on a playstation emulator I started writing years ago) that can execute MIPS compiled modules without the need for allocating additional executable memory
5
11
91
WatchMojo Presents: Top 5 APT π€‘ Moments of 2024 All that effort for initial access just to use sam save and vssadmin π https://t.co/MUjrfybw5O
0
0
8
The (Anti-)EDR Compendium EDR functionality and bypasses in 2024, with focus on undetected shellcode loader. https://t.co/5na8KcjqbV
2
69
233
Yesterday I finally finished part II of my anti rootkit evasion series, where I showcase some detections for driver "stomping", attack flawed implementations of my anti-rootkit, hide system threads via the PspCidTable and detect that as well. Enjoy! https://t.co/kxo34cIX4N
eversinc33.com
Detectin driver 'stomping' and hiding system threads by manipulating the PspCidTable.
10
113
304
Top 1% red teamer POV
0
0
16
POV: You pushed C-00000291*.sys on Friday and see a meeting with HR and Legal on Monday
0
1
4
CrowdStrike legal team are gonna be pulling out all the tricks to dodge the incoming lawsuits
0
0
8
Great talk about MacOS logic bugs by my friend Max!
0
0
3
#Maldev - Packer Development is going strong in a #workshop at #x33fcon being taught by @ShitSecure and @eversinc33 - #redteam #blueteam
1
3
38
Just got linked this really awesome blog by @_vanvleet about Detection Data Models. This should be a valuable read for my Detection Engineering friends out there: https://t.co/l1GNHryHNo
medium.com
In this post, Iβll present a simple approach to detection modeling and demonstrate how a Detection Data Model helps identify threats.
0
0
11