
Kevin Ott
@kevin0x90
Followers
313
Following
297
Media
8
Statuses
192
🚀 Launching TheManticoreProject – a long-term offensive & defensive security ecosystem in Go! First release (the core library): Manticore 🐾 🔧 Modular Go library to craft & interact with network protocols. ⚙️ SMB support coming soon. 🌐
github.com
A cross platform library to write offensive and defensive security tools in Go - TheManticoreProject/Manticore
3
31
88
I'm looking forward to being in Orlando in a few months to teach my @SANSOffensive @SANSInstitute class: #SEC670 🤓 If you want to get your feet wet with making C++ Windows implants along with some Florida sun, this is the event for you! Reg link to the event:
0
3
11
SANS CDI 2024 is fast approaching. I'll be teaching my @SANSOffensive implant dev class #SEC670. Sign up for some nerdy C++ fun as you make Windows implants for a custom Python C2 server.
0
5
11
Super excited to be in LA for this years @SANSInstitute Hollywood Hackfest. @jon__reiter and I will give talk on how to improve a module mapping loader using modern C++ paradigms, showcasing some of the techniques we teach in SEC670. Don't miss it!
1
2
10
It’s official!!! The first update to #SEC670 is done and approved for release at #SANSFIRE 🔥 for those coming in person, I have some cool things up my sleeve for you all. It’s not too late to register in person 👇🏻 https://t.co/agJovpZcNs
@SANSOffensive @SANSInstitute
2
6
33
#SANSFIRE isn’t too far away now! I’ll be there in person teaching #SEC670 with a sweet update to the course! You better come ready for some serious coding 🤓 Sign up down below 👇🏻 @SANSInstitute @SANSOffensive
https://t.co/9oTDZb3wi8
1
3
10
It's back!! Part 8 of my Intro to C series is finally here coming this Monday afternoon. Be sure to register down below. Always free and always recorded! @SANSOffensive @SANSInstitute
https://t.co/1ReO4i8bDo
4
20
104
Don‘t miss out on a great SANS class! With modern endpoint security solutions, custom implants are the way to go. @SANSInstitute #SEC670 teaches you everything to build your own 👾 https://t.co/1PVX58G83e
sans.org
Sharpen elite professional security skills forging stealthy Windows implants, customized shellcode, and command and control frameworks that evade contemporary defenses.
Massive update coming to my #SEC670 course with @SANSOffensive @SANSInstitute this summer!! 😀 new and harder labs, new VMs, and new CTF boxes to implant! Hoping this launches for #SANSFIRE See you in DC.
0
1
4
Hey all, here I some future runs of the @SANSOffensive @SANSInstitute course #SEC670 We’d love to see you at one of these in person!
1
3
5
I'm teaching adv pen testing & exploit dev in Orlando on 24-Mar @jon__reiter is teaching Windows implant dev. He is who you want teaching this class! @fulmetalpackets is teaching his new course on product security testing & preventing supply chain attacks! https://t.co/vv7SXcW7Hn
0
10
34
Target Date: Saturday, 2024-09-07 Target Location: Frankfurt, Goethe University https://t.co/bsFOkvQI3M
0
9
10
Want to learn red teaming? Gain invaluable practical tips from SANS Instructors @dmay3r and @jorgeorchilles on maintaining operational security while setting up C2 infrastructure Register here! https://t.co/RA7UjIqmoA
0
12
38
Turns out: I am not losing my sanity. It is exactly the same vulnerability. The only difference is the offset (actually 56 vs 72). Fun little exercise.
Am I going crazy or are CVE-2022-44898 and CVE-2019-17603 the same bug? Is this all just the WinIO driver renamed to ene.sys and msio64.sys? Both have drivers call memcpy without bounds checking in IOCTL 0x80102040 with similar (72/80) offset to RIP. What am I missing?
0
0
1
Am I going crazy or are CVE-2022-44898 and CVE-2019-17603 the same bug? Is this all just the WinIO driver renamed to ene.sys and msio64.sys? Both have drivers call memcpy without bounds checking in IOCTL 0x80102040 with similar (72/80) offset to RIP. What am I missing?
0
0
1
Who knew it would be so easy to fix security. We are done here, time to become a cook and open a food truck.
1
0
1
Join our partner, @xplt_labs, for their PEN-200 #OSCP live training in Eschborn–Frankfurt, Germany! Enroll here: https://t.co/tHbTUj0crl 🗓️ November 6th, 2023 - November 10th, 2023 📍On-site
0
5
22
I can 100% recommend both the bootcamp and the advanced training. Beer, waffles and exploitation is a great combination!
I really enjoy teaching private classes! Even if you're just a small group (min. 4), willing to travel to Belgium, we can make it happen! I still have some timeslots in November & December. DM if interested @corelanconsult #windows #exploitdev #corelan #nevergiveup
0
0
2
Join our partner. @xplt_labs, for their official PEN-200 #OSCP live training course in Eschborn–Frankfurt, Germany! Training in German: https://t.co/yCLijc0c5z Training in English:
eventbrite.de
5 Tage intensives und praxisnahes OSCP-Bootcamp auf Deutsch, inkl. Vorbereitung auf die herausfordernde 24-Stunden OSCP-Prüfung.
0
9
50
I am going to be in Abu Dhabi in two weeks. If someone wants to meet and discuss Red Teaming or C2 dev, hit me up
0
0
1
#OffensiveCon23 will take place on the 19th-20th of May 2023. Stay tuned for further updates!
3
65
310