t0nvi Profile Banner
tonvi Profile
tonvi

@t0nvi

Followers
361
Following
713
Media
6
Statuses
744

Retooling Co-Founder, trainer

Joined January 2010
Don't wanna be here? Send us removal request.
@reconmtl
REcon
1 day
Recon https://t.co/UdlFWJkDYg Conference: June 19 to 21 2026. More announcements coming soon.
2
15
52
@hackerfantastic
hacker.house
4 days
SignToolEx, a code-signing tool that enables the use of expired certificates for executable signing operations. https://t.co/XZenT5JtHC
6
32
134
@SEKTOR7net
SEKTOR7 Institute
3 days
Reversing Microsoft Defender's signatures for evasion. Deep dive into VDM guts - a gzip-compressed files with no encryption to evade entire signatures with just 1 byte change. A research by RETooling crew (@DrCh40s && @t0nvi). Nicely done, chaps! Post: https://t.co/jpjmDl10f9
4
115
440
@Jbanklestankle1
Bilbo Baggins
8 days
25
448
8K
@REverseConf
RE//verse
28 days
Announcing our second RE//verse Keynote, Laurie Kirk! Laurie is a researcher at Google specializing Reverse Engineering, deobfuscation, and decompilation. She runs a YouTube channel (@LaurieWired) that covers all sorts of in-depth research topics on reverse engineering, low level
3
32
504
@DebugPrivilege
DebugPrivilege
28 days
Just posted a write-up on a DC hang traced to a deadlock inside LSASS. I break down call stacks, the blocked threads, and how doing LDAP work in DllMain triggered the issue.
Tweet card summary image
medium.com
TLDR: For weeks a customer saw random domain controllers freeze with no clear errors in Event Viewer. It looked like network timeouts and…
2
29
94
@DrCh40s
Ch40s 🏴‍☠️
1 month
Big thanks to #Hexacon for hosting our MalOpSec training and for the outstanding hospitality and top-notch conference! @t0nvi and I are attending the conference if you’re around and want to chat about adversary emulation or access operations, feel free to stop by and say hi! 👋
0
1
2
@_CPResearch_
Check Point Research
1 month
🚨 Rhadamanthys v0.9.2 is here! What’s new in this multi-layered stealer’s latest evolution? We break down the updates, tactics, and what defenders need to know. Dive into our blog for the full analysis. https://t.co/b5SL8bWR81
Tweet card summary image
research.checkpoint.com
Research by: hasherezade Highlights Introduction Rhadamanthys is a complex, multi-modular malware sold on the underground market since September 2022. It was first advertised by the actor “kingcret...
0
32
112
@fede_intern
Fede’s intern 🥊
2 months
FuzzingLabs and @Pat_Ventuzelo are quickly becoming global leaders in offensive security. Since I was a kid, I've been passionate about hacking, finding bugs, creating exploits, and diving deep into how systems work. Now, it’s a dream come true to be working on the frontier of
@FuzzingLabs
FuzzingLabs
2 months
Excited to announce that our CEO @Pat_Ventuzelo is giving the Closing Keynote at #BSidesberlin 🎤 AI for AppSec and Offensive Security: From Automation to Autonomy 📅 8 Nov 2025 | 📍 CIC Berlin AI is reshaping vulnerability research, from audits & #fuzzing to autonomous red
7
5
16
@ESETresearch
ESET Research
2 months
#ESETresearch’s Matthieu Faou and Zoltán Rusnák will present at Labscon 2025 @labscon_io: “Gamaredon x Turla: Unveiling a 2025 Espionage Alliance Targeting Ukraine”. Join them in Scottsdale, September 19 at 11:00 AM MST. 1/3
1
8
26
@gerhart_x
Arthur "Gerhart" Khudyaev
2 months
Analysis of Windows Secure Kernel security bugs. https://t.co/eZ77DTgHAo
1
35
142
@diversenok_zero
diversenok
8 months
Better socket handle visibility coming soon to @SystemInformer 🔥 When viewing a process handle table, SI will recognize files under \Device\Afd and retrieve information about their state, protocol, addresses, and more. Also works on Bluetooth and Hyper-V sockets 🤩
2
21
114
@blackorbird
blackorbird
2 months
#APT28 Espionage Tool Provides Backdoor Access to Microsoft Outlook https://t.co/zOXG0PVuNz
0
60
188
@labscon_io
LABScon 2025
2 months
Finally, we will unveil the details behind CVE-2025-6198, a BMC-related security issue that allows attackers to directly “bring your own vulnerable firmware image". https://t.co/rV8HhqLbnR
Tweet card summary image
labscon.io
0
9
14
@33y0re
Connor McGarr
2 months
Today I am releasing a new blog post on VSM "secure calls" + the SkBridge project to manually issue them!! This blog talks about how VTL 0 requests the services of VTL 1 and outlines common secure call patterns!!! Blog: https://t.co/xzB1s7HoPO SkBridge: https://t.co/0zO0E1L4Sy
3
99
259
@yarden_shafir
Yarden Shafir
3 months
@_RastaMouse To clarify because I realized I forgot an important detail: you can still call the API from Medium IL in recent windows 11 but the Object field leaking a kernel address will be 0 unless the caller has SeDebugPrivilege enabled.
0
1
14
@hackyboiz
hackyboiz
4 months
[Research] CVE-2025-24985: Windows Fast FAT Driver RCE Vulnerability https://t.co/N0ttHnqTe1 The vulnerability was caused by the ability to control five variables within the VHD file that determine the number of clusters.
2
39
110
@Idov31
Ido Veltzman
4 months
I'm happy to finally release NovaHypervisor! NovaHypervisor is a defensive hypervisor with the goal of protecting AV/EDR vendors and crucial kernel structures that are currently uncovered by VBS and PatchGuard. Full explanation below 1/6. https://t.co/BGszXQ0Oi6
Tweet card summary image
github.com
NovaHypervisor is a defensive x64 Intel host based hypervisor. The goal of this project is to protect against kernel based attacks (either via Bring Your Own Vulnerable Driver (BYOVD) or other mean...
7
89
339
@0xor0ne
0xor0ne
4 months
"SecureBoot bypass for UEFI-compatible firmware based on Insyde H2O" Part 1: https://t.co/MoDNwdg3kK Part 2: https://t.co/3PDIf4yxEo #cybersecurity #uefi
1
56
285
@0xor0ne
0xor0ne
5 months
Excellent blog post exploring the re-implementation of APT41 Scatterbrain's obfuscation for adversary emulation https://t.co/831xfyZ6Vu #malware #infosec
1
53
243