vadersec
@iamchaossec
Followers
23
Following
6
Media
0
Statuses
67
22 |not human at all
the abyssal nightmare realm
Joined July 2024
Stop looking for id=1. Start looking for the logic flaws scanners miss. π Basic IDORs are dying. Modern apps use GUIDs (550e8400-e29b...) to hide data. But obscurity isn't security. Here is the blueprint for finding Advanced Broken Access Control in 2025. π§΅π #bugbountytips
4
24
175
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ‡οΈ
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
308
658
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. https://t.co/GC5wA2y3EO
github.com
Windows protocol library, including SMB and RPC implementations, among others. - trustedsec/Titanis
14
187
557
DLL Sideloading for Initial Access β Red Team Operator's Guide π₯ (new article) https://t.co/rXWXasjEQs - finding software to backdoor - finding DLL and function to backdoor - legit software backdooring - OPSEC considerations #redteam #infosec #malware #security
1
98
340
ππ₯ Just dropped a monster stash of wordlists for bounty hunters. Weβre talking: βοΈ Subdomains to slice attack surface π Creds & API keys for low-hanging wins π Payloads (XSS/SQLi/SSRF/LFI/RCE) to pop boxes π Directories & APIs no admin wants you to see Basicallyβ¦ your
drive.google.com
2
10
35
TrapFlagForSyscalling - Evading userland hooks through indirect tampered syscalls with the Trap Flag. https://t.co/raJjbzKyos
github.com
Bypass user-land hooks by syscall tampering via the Trap Flag - Maldev-Academy/TrapFlagForSyscalling
0
46
248
gdbw v0.1.0 releasing tomorrow! πΈ Still a lot to add but hoping to get it into user's hands sooner so that we can figure out pain points etc.
6
4
63
when looking for cache deception bugs remember to brute force delimiters in all endpoints returning sensitive data, In a recent target I found three endpoints Vulnerable to cache deception with Different delimiters, also try: /endpoint$delimeter$.js /endpoints/$delimeter$.js
3
21
211
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls
github.com
Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls. - MatheuZSecurity/RingReaper
0
18
94
Most red team books tell you WHAT to do. This one shows you HOW to actually do it. Red Team Engineering by @CaseyLErdmann breaks the "theory only" curse β custom tools, real infrastructure, the techniques that usually stay behind closed doors. From someone who's actually been
12
187
1K
Introducing: Hells Hollow - Thought rootkit SSDT hooking was dead? Following my previous work, I have managed to essentially reintroduce SSDT hooks, capable of modifying the *original* KTRAP_FRAME and more! Whitepaper: https://t.co/eFDLsey9Av
#infosec #cybersecurity
5
96
350
No fucking way lol
172
552
17K
0
49
335
we are literally at "jailbreak yourself" rofl
65
141
3K