Soumyani1
@reveng007
Followers
1K
Following
6K
Media
37
Statuses
3K
Content absorber | CRTO | CRTP | @BlackHatEvents Asia, USA, SecTor, Europe 2024 Arsenal and @WWHackinFest 2024 Presenter
seed
Joined July 2020
Tried against Sofos XDR. It successfully Evaded! Thanks to @Sh0ckFR (for letting me know abt the Trial Version of this XDR) Also thanks to @SEKTOR7net (For letting me know about /MT compiler flag. How it statically links CRT functions together in a binary)
Introducing DarkWidow (Dropper/PostExploitation Toolkit): Capabilities: 1. Indirect Dynamic Syscall 2. SSN + Syscall address sorting via Modified TartarusGate approach (Other capabilities are in the comments...) https://t.co/7hfk9U5D9h
6
16
64
Automating COM/DCOM vulnerability research
incendium.rocks
Diving into COM/DCOM and how to automate vulnerability research using a fuzzing approach.
0
8
34
Dynamic binary instrumentation (DBI) on Windows X86-64 with DynamoRio https://t.co/OlRuXSPWu1
1
30
92
I might be DUMB but I was today years old when I found out that when the CLR allocates memory for IL, it has RWX permissions which means you can do this:
4
14
117
Releasing project WILDBEAST: https://t.co/AJm8TDWe2b Nothing novel here, just one of my personal setups for capability development using VS Code and GCC. (btw: I document all useful compiler switches and contrary to popular belief, -fPIC does bugger all with MinGW)
github.com
Windows capability development using GCC and GNU Make - winterknife/WILDBEAST
0
6
34
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
80
246
π― Amazon S3 Bucket Name Squatting By Costas Kourmpoglou What happens when AWS customers delete S3 buckets without considering name reuse? Costas Kourmpoglou dives into S3 bucket name squattingβa subtle but potent threat vector that can lead to data leaks, broken apps, and even
0
4
11
A bit of a different post for me, but here's a hand curated list of Linux kernel cmdline parameters for system hardening: https://t.co/nWOkVkh6YK
lampreylabs.com
A hand-curated list of Linux kernel command-line parameters for hardening the kernel against exploitation on desktop platforms.
0
1
2
Completed another CTF by Wiz, "The Ultimate Cloud Security Championship 12 Months X 12 Challenges". This CTF box tells us that even if Strong Security measures like "AWS data perimeters" is configured, it can be exploited if other AWS service configurations are misconfigured. We
linkedin.com
After watching this video, you will understand why the increased cloud adoption rate has led to an increase in cloud attacks as well as the most common cloud services being exploited in the wild.
0
1
1
Here I'm, as promised with the 5 remaining scenarios. Scenarios: 1. "Bulk Remote Sessions Across Multiple Instances via SSM StartSession" Detection 2. "AWS Security Group Public Exposure of SSH Port 22" Detection 3. "Data Theft via Shared AMI" Detection 4. "Data Theft via Shared
I have created a Github repo targeting AWS Attack Simulation and Detection. Followed these AWS challenges https://t.co/TZhIEXoyaa (Thanks to @bohops for letting me know about this website for getting introductory hands on for log analysis π ) Scenarios: 1. "AWS Delete DNS
0
0
2
Fun little IOC in impacket-smbserver's Negotiate Protocol Response π
7
65
282
New post out on https://t.co/yE0oHW7n7G!! All about writing actually useful incident response playbooks, through the lens of applied detection engineering. Based on cool stuff we're doing in our SOC https://t.co/SpfJJ0wIg2
detect.fyi
Threat Detection Engineering and DFIR Insights
1
27
100
New blog post coming soon of me analyzing a deadlock inside LSASS :P
1
13
84
π Browser history can play a critical role in incident response. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. Get inspiration on how to transform your own incident response strategy with a scalable, automated workflow from our newsletter
tines.com
Sep 24 2025, 10:00 AM β’ US Eastern Time β’ Learn how Booking.com turned their security challenges into a winning incident response workflow.
1
6
71
Been a long time since I've written something for my blog. Recently got inspired to break down how a very basic evasion attack on a machine learning model might work. Check it out https://t.co/JOnvSPztev
steve-s.gitbook.io
An example evasion attack against (probably) the worst machine learning classifier of all time
2
36
120
I put a BOF loader in a BOF so that you can run BOFs from a BOF. If you've had issues getting a BOF to work with CS's BOF loader in the past, you now have a drop-in way to get a little bit more compatibility. https://t.co/x6neBpHyIr
github.com
A BOF that's a BOF Loader. Contribute to 0xTriboulet/InlineExecuteEx development by creating an account on GitHub.
8
45
198
I have created a Github repo targeting AWS Attack Simulation and Detection. Followed these AWS challenges https://t.co/TZhIEXoyaa (Thanks to @bohops for letting me know about this website for getting introductory hands on for log analysis π ) Scenarios: 1. "AWS Delete DNS
0
3
10