
Matt Hand
@matterpreter
Followers
10K
Following
2K
Media
36
Statuses
861
Director, Security Research @preluderesearchš | Author of Evading EDR https://t.co/E5fs0sSTOv š | Adversary tradecraft & windows internals š¦
USA
Joined June 2010
I've long been interested in how EDRs work under the hood and how we can apply a more evidence-based approach to evasion. I'm happy to announce that I've written a book covering these topics with @nostarch which is now available for preorder š.
nostarch.com
A guide to understanding the attack-detection software running on Microsoft systems, and how to evade it.
46
334
1K
RT @PreludeResearch: Join us in Islander E-I for @33y0reās talk on KCFG AND KCET internals #BHUSA . .
0
3
0
Iāll be around all day so come say hi if you see me! Iām hiring security researchers and developers.
jobs.ashbyhq.com
SOFTWARE ENGINEER ABOUT PRELUDE Prelude is a small team of security researchers and software developers working to reinvent the way we protect endpoints in a world where threats are complex, emerge...
0
3
18
Two years ago, I left red teaming for a new challenge in endpoint security. I'm humbled by the incredible team we've built and so proud to share this research preview of our work. Itās an idea I believe in deeply, and I canāt wait for whatās ahead. š¤.
Announcing our whitepaper on the future of endpoint security.
4
24
177
RT @33y0re: I am excited to say my talk at @BlackHatEvents USA 2025 was accepted where I will be sharing my recent research on kernel-modeā¦.
0
24
0
RT @0xdab0: RUST WINDOWS DOCS MCP. If you've ever done Rust dev with the windows crate, you know it's painful because it makes up API callsā¦.
0
5
0
RT @standa_t: The new blog post on supervisor shadow stack restrictions / supervisor shadow-stack control.
tandasat.github.io
This post introduces one of the virtualization features needed to keep kernel-mode shadow stack functional against kernel exploits: supervisor shadow stack restrictions / supervisor shadow-stack...
0
62
0
The team at @PreludeResearch is looking for Windows internals researchers, reverse engineers, and people passionate about rethinking how we combat modern adversaries. Join us!
1
9
49
RT @33y0re: Today Iām sharing a blog post on the implementation of kernel mode shadow stacks on Windows! This post covers actively debugginā¦.
connormcgarr.github.io
Using SourcePointās JTAG debugger to investigate the implementation of Intel CET Shadow Stacks in kernel-mode on Windows
0
154
0
RT @elasticseclabs: Weāre adding a new section to @elasticās HackerOne Bounty Program! Today, weāre opening our SIEM and EDR rules for testā¦.
elastic.co
Elastic is launching an expansion of its security bounty program, inviting researchers to test its SIEM and EDR rules for evasion and bypass techniques, starting with Windows endpoints. This initia...
0
67
0
Weāre going to start doing some more informal hangouts in our @discord server and figured weād host the first as everyone starts winding down for the year. I hope you can join us to talk shop and share what youve learned this year š.
Former offsec operator and author of "Evading EDR," @matterpreter has seen the development of how organizations evaluate defenses šŖ“. Join us on Dec 17 @ 1 ET for a retrospective on his experience, his book, and the evolution of #controlvalidation.
0
0
8
This year's bundle has an amazing selection and I'm so excited to see Evading EDR included. If you haven't picked up a copy, now is a great time to get one š.
18 hacking books. Name your price. Our Hacking 2024 @humble bundle is now LIVE. Support @ACLU & @EFF while leveling up your security game. #CyberMonday
2
10
50
RT @clintgibler: š¬ Applying Test-Driven Development to Detection Engineering. @matterpreter describes applying TDD principles to detectionā¦.
0
7
0
RT @preludeorg: It's time to overcome manual efforts when it comes to purple teamingš«. Next weekājoin @matterpreter at the @SANSInstituteā¦.
0
1
0
RT @preludeorg: Test-driven developmentānot just for software engineering. @matterpreter breaks down how applying this logic streamlinesā¦.
0
6
0
RT @33y0re: I am very happy to have presented my talk "Redefining Security Boundaries: Unveiling Hypervisor-Backed Security Features For Wiā¦.
github.com
Contribute to connormcgarr/Presentations development by creating an account on GitHub.
0
41
0
So pumped to have Max on the teamšš¤.
It's been a wild couple weeks (travel + hurricane) and I meant to do this sooner. Today was my first day at @preludeorg! Really pumped to be working with these guys.
1
0
12
RT @tifkin_: Really happy to see that Ghidra 11.2 has a built-in option for VS code now. Checkout the Ā VSCodeProjectScript script to set iā¦.
0
10
0
RT @preludeorg: When security teams need certainty, opaque logic stands in the way of understanding how their #EDRs respond to threats. Whaā¦.
0
2
0