Nikhil
@gh0stbyt3
Followers
277
Following
937
Media
7
Statuses
126
Cyber Security Enthusiast | OSCE³ (OSEP | OSWE | OSED) | OSCP | CRTE | CARTP | CRTO | CRTO II
127.0.0.1
Joined November 2019
DiffRays v2.0 is live Smart diff w/ custom scoring, mnemonics for better diff results. https://t.co/U6RzM3XcXk PR Credit: @gh0stbyt3 [1/2]
github.com
DiffRays is a research-oriented tool for binary patch diffing, designed to aid in vulnerability research, exploit development, and reverse engineering. - pwnfuzz/diffrays
1
1
1
My new blog describes a vulnerability in Windows that allows a low privileged user or guest to remotely crash the Spooler service in Windows by one simple call. https://t.co/fiQVib9k6C
incendium.rocks
Showcasing a vulnerability in Windows that causes the Spooler service to crash remotely.
0
21
69
Teaming with @gh0stbyt3, we built DiffRays for headless IDA (@HexRaysSA) decompilation. It stores decompiled code in a SQLite DB and provides a Web UI for diffing between the stored functions. Built for vuln research. https://t.co/U6RzM3XcXk
#pwnfuzz
5
39
132
It's been almost a year since my last blog... So, here is a new one: Extending AD CS attack surface to the cloud with Intune certificates. Also includes ESC1 over Intune (in some cases). https://t.co/Dm1x9ORW7Q Oh, and a new tool for SCEP:
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
8
194
530
Good Morning! Just published a blog post diving into Windows Kernel LFH exploitation in the latest Windows 24h2 build, Focusing on controlled allocations to achieve arbitrary read/write in the kernel. https://t.co/ZAGDKCNZOp
r0keb.github.io
Good morning! In today’s blog post, we’re going one step further than in the previous post Windows Kernel Pool Internals (which I recommend reading to understand some of the concepts discussed here),...
4
79
311
Today MSRC fixed two vulnerabilities I reported a couple months ago. EoP in Windows Update service (affects only windows 11/10 with at least 2 drives) https://t.co/YnCsk1934F EoP in Microsoft PC Manager https://t.co/ssudyvpgDS PoC for CVE-2025-48799: https://t.co/brRVf18DnY
github.com
Contribute to Wh04m1001/CVE-2025-48799 development by creating an account on GitHub.
9
99
387
Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. https://t.co/2KlYba9gxc
r0keb.github.io
Good morning! In today’s blog post we’re going to dive into a topic that has interested me for quite some time, the Windows kernel pool. It’s a topic that tends to have “scarce” documentation online...
4
134
406
Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. https://t.co/ykJv0sePN9
ibm.com
Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the...
23
236
801
New blogpost! Want to see how we exploited @Synology network-attached-storage devices at Pwn2Own Ireland? RCE to root via out-of-bounds NULL-byte writes, click the embed for a fun little writeup of CVE-2024-10442 🔎🎉 https://t.co/VOhC5NSCat
blog.ret2.io
In October, we attended Pwn2Own Ireland 2024 and successfully exploited the Synology DiskStation DS1823xs+ to obtain remote code execution as root. This issu...
1
70
273
I made this tool that checks if drivers from https://t.co/QABNdVCnBU are blocked by HVCI. It helps identify vulnerable drivers not blocked by Windows Hypervisor Code Integrity policy to find suitable BYOVD candidates. Tool: https://t.co/57NDRuKiby
#BYOVD #HVCI #Cybersecurity
0
8
16
Hey there, Finally published the article on the exploit for CVE-2025-21333-POC exploit. Here the link to the article:
1
152
489
Today I’m sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugging the Secure Kernel and also outlines why VTL 1 is relied on to help maintain the integrity of the supervisor shadow stacks!
connormcgarr.github.io
Using SourcePoint’s JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
10
155
505
0x0 - Windows Driver 101 - https://t.co/QQBRbTnwQP 0x1 - Setup & Reversing - https://t.co/eeONmyJAUj 0x2 - SMEP & kASLR & VBS - https://t.co/gCeVED3kpO 0x3 - VBS & HVCI - https://t.co/434waY8CxS
#windows #cybersecurity #kernel #redteam
0
2
6
I’ve been diving into Windows Internals and Kernel Exploitation, and I’m excited to share my notes through a new series of blog posts (since it’s been a while). The first four parts are now live, covering some of the basic concepts and exploitation techniques.
2
1
8
Learn advanced analysis techniques 🔥🚀 from real-world malware and harness this knowledge to craft your own malware ⚔🦠 understanding attacker strategies. Empower yourself with both defensive and offensive cybersecurity skills in this immersive workshop led by world-renowned
7
55
140
Those bad boys got new guns: - ADCS ESC12 & 13 and ESC8 from WSUS poisoning - SCCM takeover from passive server - AD Miner and SOAPHound - LDAP pass back - PXE boot attacks - Creds from third-party softs ... https://t.co/Q3YeRqPDnc
https://t.co/mq25kTec2V
https://t.co/Ey8wayKWUz
0
120
332
Modern implant design: position independent malware development. A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing. https://t.co/Drz7kcVhyK Repo:
github.com
A modern 32/64-bit position independent implant template - GitHub - Cracked5pider/Stardust: A modern 32/64-bit position independent implant template
25
306
979
October giveaway - We are giving away 2 seats for our latest "AD CS Attacks" Lab. Please follow @AlteredSecurity, Reply and Repost to participate. Two random winners will be announced on 19th October 2023. https://t.co/OpanHXNU9o
#CESP #RedTeam
183
184
155
Congratulations to @0xw0lf for clearing our Certified Azure Red Team Professional exam! #AzADLab #CARTP #AlteredSecurity cc @nikhil_mitt
https://t.co/TkqD92HcJP
https://t.co/Afk4v08wrI
alteredsecurity.com
CARTP - Certified by Altered Security Red Team Professional for Azure is an industry-recognized beginner friendly hands-on certification on Azure Red Team and Penetration Testing.
0
1
2