reveng007 Profile Banner
Soumyani1 Profile
Soumyani1

@reveng007

Followers
1K
Following
6K
Media
37
Statuses
3K

Content absorber | CRTO | CRTP | @BlackHatEvents Asia, USA, SecTor, Europe 2024 Arsenal and @WWHackinFest 2024 Presenter

seed
Joined July 2020
Don't wanna be here? Send us removal request.
@reveng007
Soumyani1
2 years
Tried against Sofos XDR. It successfully Evaded! Thanks to @Sh0ckFR (for letting me know abt the Trial Version of this XDR) Also thanks to @SEKTOR7net (For letting me know about /MT compiler flag. How it statically links CRT functions together in a binary)
@reveng007
Soumyani1
2 years
Introducing DarkWidow (Dropper/PostExploitation Toolkit): Capabilities: 1. Indirect Dynamic Syscall 2. SSN + Syscall address sorting via Modified TartarusGate approach (Other capabilities are in the comments...) https://t.co/7hfk9U5D9h
6
16
64
@raashidbhatt
Raashid Bhat
2 days
Dynamic binary instrumentation (DBI) on Windows X86-64 with DynamoRio https://t.co/OlRuXSPWu1
1
30
92
@raashidbhatt
Raashid Bhat
2 days
Escaping DLL Loader Locks with PostProcessInitRoutine https://t.co/jVr5hCA1v3
2
38
157
@whokilleddb
db
4 days
I might be DUMB but I was today years old when I found out that when the CLR allocates memory for IL, it has RWX permissions which means you can do this:
4
14
117
@_winterknife_
winterknife 🌻
5 days
Releasing project WILDBEAST: https://t.co/AJm8TDWe2b Nothing novel here, just one of my personal setups for capability development using VS Code and GCC. (btw: I document all useful compiler switches and contrary to popular belief, -fPIC does bugger all with MinGW)
Tweet card summary image
github.com
Windows capability development using GCC and GNU Make - winterknife/WILDBEAST
0
6
34
@bohops
bohops
7 days
Last month, @d_tranman and I gave a talk @MCTTP_Con called "COM to the Darkside" focusing on COM/DCOM cross-session and fileless lateral movement tradecraft. Check out the slides here: https://t.co/1KNln1ldzF Recording should be released soon.
Tweet card summary image
github.com
Slides and resources from MCTTP 2025 Talk. Contribute to bohops/COM-to-the-Darkside development by creating an account on GitHub.
1
80
246
@AwsSecDigest
AWS Security Digest
8 days
🎯 Amazon S3 Bucket Name Squatting By Costas Kourmpoglou What happens when AWS customers delete S3 buckets without considering name reuse? Costas Kourmpoglou dives into S3 bucket name squattingβ€”a subtle but potent threat vector that can lead to data leaks, broken apps, and even
0
4
11
@5mukx
Smukx.E
10 days
Driver Reverse Engineering 101 https://t.co/kDuBKwtt9S
1
98
532
@_winterknife_
winterknife 🌻
11 days
A bit of a different post for me, but here's a hand curated list of Linux kernel cmdline parameters for system hardening: https://t.co/nWOkVkh6YK
lampreylabs.com
A hand-curated list of Linux kernel command-line parameters for hardening the kernel against exploitation on desktop platforms.
0
1
2
@reveng007
Soumyani1
13 days
Completed another CTF by Wiz, "The Ultimate Cloud Security Championship 12 Months X 12 Challenges". This CTF box tells us that even if Strong Security measures like "AWS data perimeters" is configured, it can be exploited if other AWS service configurations are misconfigured. We
Tweet card summary image
linkedin.com
After watching this video, you will understand why the increased cloud adoption rate has led to an increase in cloud attacks as well as the most common cloud services being exploited in the wild.
0
1
1
@reveng007
Soumyani1
15 days
Here I'm, as promised with the 5 remaining scenarios. Scenarios: 1. "Bulk Remote Sessions Across Multiple Instances via SSM StartSession" Detection 2. "AWS Security Group Public Exposure of SSH Port 22" Detection 3. "Data Theft via Shared AMI" Detection 4. "Data Theft via Shared
@reveng007
Soumyani1
17 days
I have created a Github repo targeting AWS Attack Simulation and Detection. Followed these AWS challenges https://t.co/TZhIEXoyaa (Thanks to @bohops for letting me know about this website for getting introductory hands on for log analysis πŸ‘ ) Scenarios: 1. "AWS Delete DNS
0
0
2
@Octoberfest73
Octoberfest7
1 year
Fun little IOC in impacket-smbserver's Negotiate Protocol Response πŸ™ƒ
7
65
282
@rcegann
rcegan
17 days
New post out on https://t.co/yE0oHW7n7G!! All about writing actually useful incident response playbooks, through the lens of applied detection engineering. Based on cool stuff we're doing in our SOC https://t.co/SpfJJ0wIg2
Tweet card summary image
detect.fyi
Threat Detection Engineering and DFIR Insights
1
27
100
@DebugPrivilege
DebugPrivilege
17 days
New blog post coming soon of me analyzing a deadlock inside LSASS :P
1
13
84
@Jhaddix
JS0N Haddix
17 days
🌐 Browser history can play a critical role in incident response. But retrieving raw artifacts from endpoints is often slow, manual, and inconsistent. Get inspiration on how to transform your own incident response strategy with a scalable, automated workflow from our newsletter
Tweet card summary image
tines.com
Sep 24 2025, 10:00 AM β€’ US Eastern Time β€’ Learn how Booking.com turned their security challenges into a winning incident response workflow.
1
6
71
@0xTriboulet
Steve S.
29 days
Been a long time since I've written something for my blog. Recently got inspired to break down how a very basic evasion attack on a machine learning model might work. Check it out https://t.co/JOnvSPztev
Tweet card summary image
steve-s.gitbook.io
An example evasion attack against (probably) the worst machine learning classifier of all time
2
36
120
@0xTriboulet
Steve S.
17 days
I put a BOF loader in a BOF so that you can run BOFs from a BOF. If you've had issues getting a BOF to work with CS's BOF loader in the past, you now have a drop-in way to get a little bit more compatibility. https://t.co/x6neBpHyIr
Tweet card summary image
github.com
A BOF that's a BOF Loader. Contribute to 0xTriboulet/InlineExecuteEx development by creating an account on GitHub.
8
45
198
@reveng007
Soumyani1
17 days
I have created a Github repo targeting AWS Attack Simulation and Detection. Followed these AWS challenges https://t.co/TZhIEXoyaa (Thanks to @bohops for letting me know about this website for getting introductory hands on for log analysis πŸ‘ ) Scenarios: 1. "AWS Delete DNS
0
3
10