kreepsec Profile Banner
kreep Profile
kreep

@kreepsec

Followers
201
Following
145
Media
12
Statuses
164

Red Team 📕, Windows 🪟, Maldev 🦠 If people didn't write bad code, I wouldn't have a job.

Joined October 2020
Don't wanna be here? Send us removal request.
@kreepsec
kreep
24 days
Hot take that isn't really a hot take: The security community is quietly outsourcing the exact cognitive capability that makes it valuable. Braindumped how to address it: 👉 https://t.co/C4PVeMpzXQ
1
2
9
@curi0usJack
Jason Lang
1 month
23
88
311
@codex_tf2
CodeX
3 months
FYI you can recompile libtcg (for crystal palace) with the mutator kit for some simple static signature resistance https://t.co/ifSW77bM2a
Tweet card summary image
gist.github.com
GitHub Gist: instantly share code, notes, and snippets.
0
6
25
@Octoberfest73
Octoberfest7
3 months
After over a year of work my second course with @_ZeroPointSec is now available! In it students will apply low level windows tradecraft in the writing of Cobalt Strike’s UDRL and Sleepmask components. To celebrate, the BOF course is 25% off thru Jan 12th! https://t.co/WFcoj2rQaq
Tweet card summary image
zeropointsecurity.co.uk
Learn how to apply low-level Windows knowledge and offensive tradecraft to Cobalt Strike's UDRL and Sleepmask for advanced evasion.
3
49
189
@codex_tf2
CodeX
3 months
if anyone is too lazy to learn to use @M_alphaaa 's boflink and doesnt want to fight MSVC to stop using funny sections in your bofs, heres a drop in replacement for the TrustedSec BOF template that uses boflink (standalone) in the makefile https://t.co/6htqGwHw6s
Tweet card summary image
github.com
BOF template with boflink and mutator kit support. Contribute to CodeXTF2/bof_template development by creating an account on GitHub.
2
16
78
@RtlDallas
Rtl Dallas
3 months
Santa's dropping a new BOF down the chimney! My Christmas gift to RedTeam operators: BOF_ExecuteAssembly https://t.co/jQeNZjPi65
4
61
242
@jack_halon
Jack Halon
3 months
A fun little Friday night project porting @AndrewOliveau C# SessionHop code to a BOF. Built off of @tiraniddo session moniker research & @CICADA8Research original IHxHelpPaneServer blog. Enjoy! https://t.co/QYcsPKaOii
Tweet card summary image
github.com
Beacon Object File (BOF) for Windows Session Hijacking via IHxHelpPaneServer COM - jhalon/cSessionHop
0
39
108
@kreepsec
kreep
4 months
Threw together a Cobalt Strike MCP yesterday. Fortra is going to release an official one apparently, but until then.. It uses the official OpenAPI spec + FastMCP. Implementation details in the blog post Github: https://t.co/JqAj9ey0aT Post: https://t.co/i8SMdU4gun
kreep.in
Earlier this year, I was playing around with a personal project consisting of an LLM-based framework for malware development when I hit a critical roadblock: how do you programmatically deploy and...
0
0
1
@kreepsec
kreep
4 months
Which one of you was it?
@Huntio
Hunt.io
4 months
🚩 SesameOp Backdoor Uses OpenAI Assistants API for Covert Command & Control https://t.co/EAXHEoaOmh Microsoft’s DART uncovered a novel backdoor that leverages the OpenAI Assistants API as its C2 channel, fetching encrypted commands and returning execution results via
0
0
0
@_RastaMouse
Rasta Mouse
5 months
lol whole new calling conventions for PIC literally a day after I release my kit 😅
1
22
106
@kreepsec
kreep
6 months
Wrote a post on implementing Syswhispers3 syscalls into BOFs. Gave an example using a previous BOF I wrote and adding syscalls to it. Added some thoughts on OPSEC and detection in there too. Blog: https://t.co/YhZfiVCaeL Repo: https://t.co/Sex7cLnwuE
0
0
0
@kreepsec
kreep
6 months
AWS quietly updated T&Cs to ban “Fireprox”style use of API Gateway closing a handy pentest trick. @ZephrFish and @turvsec already rolled alternatives such as Omniprox and Flareprox. Banning tools only hampers legit testers, attackers will proxy anyway.
3
13
63
@dmcxblue
David
6 months
WAX files another file format capable of grabbing NTLM hashes the file requires authentication to remote file servers that host our playlists #redteam
1
26
146
@tijme
Tijme Gommers
7 months
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. https://t.co/761G96JDF1
11
98
257
@unsigned_sh0rt
Garrett
7 months
knew win10 had the dsquery.dll laying around but never knew what to do with it "rundll32.exe dsquery.dll OpenQueryWindow" will pop open a console for you and you can do some light LDAP recon you can also open with with win + ctrl + f probably useful for VDI/Citrix type tests
7
78
382
@kreepsec
kreep
7 months
👀🔥
@0xw2w
Max Yaremchuk
7 months
Facebook Messenger for Windows RCE worth $112K via Slack/Viber DLL files override using path traversal in attachments by @vulnano
0
0
1
@kreepsec
kreep
7 months
We presented Module Override, an alternative process injection technique, you can find the blog posts on it at zer0phat’s blog
0
0
0
@kreepsec
kreep
7 months
Had an awesome time at #DefCon 33. Lots of new discoveries, first time speaking at the #redteamvillage along with @zer0phat and met lots of cool people. Looking forward to the next one!
1
1
3
@incendiumrockz
incendiumrocks
8 months
I remember that I had to do some research online on how to make exploits for vulnerabilities over MS-RPC. With this blog, I hope to fill the gap on the lacking information available online on how to make these yourself. https://t.co/1YLS5ZY4A3
Tweet card summary image
incendium.rocks
Showcasing some different ways to craft exploits for vulnerabilities over MS-RPC
1
53
136
@kreepsec
kreep
8 months
This is going to be a fun one. Delighted to join @zer0phat for this one! If you see me around at Defcon and want to nerd out on this stuff please say hi!
@RedTeamVillage_
RedTeamVillage
8 months
💻 ModuleOverride – Changing a Tyre Whilst Driving – @zer0phat & @kreepsec teach process injection using existing memory sections to run malicious shellcode. Hands-on demos and detection strategy discussions at @redteamvillage_ during @defcon 33! ⚡
0
1
1