
Alex
@xaitax
Followers
3K
Following
1K
Media
340
Statuses
4K
Turning hacker instincts into boardroom insights.
Switzerland
Joined March 2010
π NTSleuth is now live! A new comprehensive Windows Syscall Extraction & Analysis Framework. Still early stages with many ideas brewing, but hope it helps some of you! β¨ Features: β’ Extracts thousands of syscalls from ntdll.dll & win32u.dll as well as and WOW64 variants β’
6
48
175
[6/x] But now I'd appreciate many more datasets from the community to add to it. Any feedback welcome and please submit your extracted JSONs at https://t.co/kfpQFXvmWB πͺπ»
github.com
Comprehensive Windows Syscall Extraction & Analysis Framework - xaitax/NTSleuth
0
0
7
[5/x] Probably my favourite: Compare syscalls across different Windows versions and architectures. What exactly has changed.
0
1
13
[4/x] Display syscall number, parameters, SAL annotation, convention and more.
0
0
3
[3/x] Browse, search, sort, filter by name, module if it has an alias or inputs.
0
0
4
[2/x] Once you select a dataset you get an overview about the particular extraction generated by NTSleuth.
0
0
8
[1/x] I would love to make NTSleuth a community driven project so the whole research community can profit off it. For that I created https://t.co/h0VXonbtP1 which can serve as a syscall database across Windows architectures, builds, versions. Not many datasets yet but will
10
34
153
π Working on something interesting: NTSleuth - a Windows syscall extraction tool with a twist... Would anyone be interested in a tool that: π― Extracts ALL syscalls from Windows (ARM64/x64) π€ Auto-resolves function parameters π Found 2,461 syscalls on Win11/ARM64 π Outputs
7
64
308
Say hello to ChromElevator (formerly Chrome App-Bound Decryption). Just dropped v0.15.0: π One command to rule them all - can hit every installed Chromium browsers at once. π€« More stealthy discovery as it finds browser paths by querying the registry with direct syscalls. No
9
61
203
Brief info and POC for this week's Apple 0click iOS 18.6.1 RCE bug CVE-2025-43300 https://t.co/EL3qg56N8X
15
217
785
Right now, the media is hyping up a story that a SECRET HACKER FIRMWARE FOR FLIPPER ZERO HAS APPEARED ON THE DARKNET THAT CAN HACK ANY CAR!!!11 WEβRE ALL IN DANGER. Letβs break it down and see if thatβs actually true (spoiler: itβs not): https://t.co/JZPz5KZKcP
27
285
2K
π‘οΈ ARM64 Call Stack Spoofing Framework for Windows! Just dropped something new for EDR evasion on ARM64, designed to cloak execution by manipulating the call stack. π Hunts for legitimate return addresses ("gadgets") in ntdll.dll π² Randomizes gadgets to resist signature-based
0
2
7
Stop blaming AI/LLMs for insecure code. Thatβs (mostly) on us. I keep seeing more and more articles saying that "vibe-coded" apps are insecure (by default). Thatβs too easy. And a cheap shot. Proper prompting helps and the real win comes with π©π«π¨π¦π©ππ’π§π +
0
0
4