litneet64
@litneet64
Followers
41
Following
120
Media
1
Statuses
194
OH MY GOD FINALLY SOMEONE HACKED THIS DUMB AS HELL IDEA
Researchers Hacked California's Digital License Plates, Gaining Access to GPS Location and User Info https://t.co/edXctQwhJc
13
265
2K
Brc4 v1.2.2/5 was leaked by MdSec and is circling the internet. I am tracking it over the past few weeks. MdSec uploaded the whole package to VT which was cracked by a Russian group Molecules, and now used by TAs which will most likely create an irrepairable damage. blog incoming
1
48
151
For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. In this article, we explore and compare 3 ways of invoking functions: IDA Appcall, Dumpulator, and Unicorn Engine. https://t.co/QO4yUGx6Eg
research.checkpoint.com
Introduction For a reverse engineer, the ability to directly call a function from the analyzed binary can be a shortcut that bypasses a lot of grief. While in some cases it is just possible to...
0
123
327
🚨New Post 🚨 Tired of begging for malware samples from randos and those pesky privileged VTI premium users? Read my "Short Guide for the Freeloader Researcher" https://t.co/iXb7ei0QNa
6
88
252
4th Place in @RedTeamVillage_ CTF, it was an amazing event, Thanks!! and Congratulations to great team & friends @cntr0llz! @fjv_cl @CesarSilence @xpl0ited11 @Hackttori @DanielAndress4 @n4t_cl @f4d3_cl @Silverfuuu_ck
@s4mnez @b3t_a @Mataya_CL @litneet64 @TheusZer0 @Halx0n
3
17
57
ImpulsiveDLLHijack: C# based tool which automates the process of discovering and exploiting DLL Hijacks in target binaries. The Hijacked paths discovered can later be weaponized during Red Team Operations to evade EDR's. #redteam #infosec #pentest
https://t.co/vBe34psIWe
1
38
99
web3: "we will revolutionize the world" also web3: "i am being exploited by watermelon emoji"
5
48
364
Need to know if your target is on vacation or which apartment he rented and when? We've just added a new #OSINT module that lets you find the #Airbnb account linked to an email address and several other information. Try it now by signing for free on https://t.co/eBKUELViwk
7
51
197
☢️ I'm so excited - just issued my first blog post☢️ As promised - sharing my @WarConPL slides deck on: https://t.co/mynQW0aXsF Power of positive feedback made me publish them during my first day of holidays (●'◡'●) Let me know if you like it 🔥
39
313
752
☢️ Agenda of my Modern Red Team Malware Development training that I'm running at @x33fcon next week - almost ready. Just a few final touches! I already feel like there won't be enough time to cover everything I'd like over 3 days. A month would do tho! What do you think?💀
7
39
218
Agradecimiento a la buena organización de Diplomados en Ciberseguridad de la USACH por este gran evento !. Esperamos con ansias nuevos eventos a lo largo de Chile🦊🏴☠️
3
7
32
Nice to see #LATAM 🌎 in the 1st International Cybersecurity Challenge by @enisa_eu #ICC_games in Athens, Greece 🇬🇷
0
8
23
2nd Day at the International Cybersecurity Challenge (ICC). Can't wait to know the absolute beasts that solved some rev challenges :D
0
0
5
Todo el éxito al equipo de latam que participa del Campeonato mundial de ciberseguridad en Atenas🥳. Mención a @Mataya_CL y @litneet64 que lo están dando todo en la competencia 🦊🏴☠️ Manden ki #cntr0llz #icsc #ENISA
1
9
33
It is a very poor decision to advertise ransomware on Instagram
22
43
402
🚨BREAKING: Bored Ape Yacht Club and Otherside Metaverse Discord servers have been hacked. Millions worth of #NFTs reportedly stolen.
3K
5K
28K
Since ms-msdt: is now readily detected and the conversation has changed to search-ms: and some more staggered social engineering tricks, here is a useless thread on a silly thing tricksters might be able to pull off with some of the new fun things we have learned: 🧵
5
77
318
Today I am releasing a blog about kernel exploitation in the age of HVCI. This post addresses calling arbitrary kernel-mode APIs, to go beyond “traditional token stealing” data-only attacks, while also dealing with kernel control flow integrity. https://t.co/SLP1dLluph
connormcgarr.github.io
Dealing with Virtualization-Based Security (VBS), Hypervisor-Protected Code Integrity (HVCI), and Kernel Control Flow Guard (kCFG).
6
221
581
Cronos: Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation
github.com
Cronos is Windows 10/11 x64 ring 0 rootkit. Cronos is able to hide processes, protect and elevate them with token manipulation. - GitHub - XaFF-XaFF/Cronos-Rootkit: Cronos is Windows 10/11 x64 rin...
0
145
333