Alex Profile
Alex

@xaitax

Followers
2K
Following
1K
Media
308
Statuses
4K

Switzerland
Joined March 2010
Don't wanna be here? Send us removal request.
@xaitax
Alex
6 days
Chrome App-Bound Decryptor v0.13.0 has landed with a major stealth overhaul:. 🚀 True Direct Syscall Engine: Bypasses user-land EDR/AV hooks on x64 & ARM64 using the "Hell's Gate" technique to find and execute raw syscall/svc gadgets. 🔒 Memory Hardening: Flips the injected
Tweet media one
3
42
143
@xaitax
Alex
7 hours
When your cyber-cred gets a paws-up from @vxunderground! 😼💾
Tweet media one
1
0
35
@xaitax
Alex
12 days
Not something you want to see from one of your forked projects.
Tweet media one
3
0
8
@xaitax
Alex
22 days
Fresh release of my Chrome/Edge/Brave App-Bound Encryption decryptor is up. 🚀. Key architectural updates:. 🧠 In-Memory Payload: The core DLL is embedded, encrypted with ChaCha20, and decrypted entirely in memory. No unencrypted file touches the disk. ⚙️ Direct Syscall RDI:
Tweet media one
5
44
213
@xaitax
Alex
1 month
Chrome App-Bound Encryption Decryptor v0.11 is here! 🚀. As a learning project, I've implemented a new Kernel-Level Execution Syscall Engine. It fuses Halo's Gate SSN deduction with a Tartarus Gate fallback for enhanced resilience against EDR hooks - fully operational on x64 &
Tweet media one
0
24
84
@xaitax
Alex
1 month
Submitted a PR to enhance ReflectiveDLLInjection in @Metasploit:. ✅ ARM64 reflective loading (using resolved APIs, not syscalls!).✅ Refactored x86/64/ARM32 loader.✅ Major injector CLI & feature upgrades.✅ API to pass params to DllMain.Details:
0
2
8
@xaitax
Alex
2 months
Needed Reflective DLL Injection for Windows on ARM64 for a project, but public examples were nowhere to be found. So, here you go. My PoC adapts @stephenfewer's classic, detailing TEB/PEB access via x18 for ARM64. Hopefully useful for red team ops & offensive security
Tweet media one
5
49
176
@xaitax
Alex
2 months
RT @ProjectZeroBugs: The Windows Registry Adventure #8: Practical exploitation of hive memory corruption
0
10
0
@xaitax
Alex
2 months
🔓 Big update! Chrome App-Bound Decryption v0.9 released!. 🛡️ Get your Cookies, Passwords, Payments, etc., from Chrome/Edge/Brave. (User-mode, no admin).👤 Decrypts all user profiles!.📂 Set your own output folder!.✅ Solid Microsoft Edge decryption. 📦 Auto-built x64/ARM64
Tweet media one
5
40
132
@xaitax
Alex
2 months
@Chocapikk_ I am happy to spin up a machine myself in my Azure environment and provide RDP access for someone to configure it if someone else likes to have access and can do it.
0
0
1
@xaitax
Alex
2 months
Hey @Chocapikk_ , if someone is able to get me one, don’t beat me to writing a MSF module. 🤣.
2
0
2
@xaitax
Alex
2 months
Does someone have a working BadSuccessor instance (DC, Windows server 2025) available (e.g., in Azure) for testing?.
1
1
4
@xaitax
Alex
2 months
RT @seanhn: I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link….
0
187
0
@xaitax
Alex
2 months
And here is a more detailed write-up:.
0
3
10
@xaitax
Alex
2 months
After some refinement and wrestling with Chrome's / Edge's quirky ABE COM setup for my decryption project, I knew I needed a better way! Hence why I built COMrade ABE. A tool to dynamically analyze Chromium ABE interfaces. It finds the CLSIDs, IIDs, method layouts & generates C++
Tweet media one
1
16
46
@xaitax
Alex
2 months
The Curious Case of the Cantankerous COM: Decrypting Microsoft Edge's App-Bound Encryption. What a fickly journey that was. Hope you all enjoy the read!.
1
7
22
@xaitax
Alex
2 months
Wrote a deep-dive research note on Chrome's App-Bound Encryption (ABE)! Unpacking its evolution, technical mechanisms, my user-mode decryption approach, and how it stacks up against other vectors.
0
18
62
@xaitax
Alex
2 months
Since it's not my forté, maybe smart people like @cyb3rops could also write some proper Sigma/Yara rules for it?.
0
0
1
@xaitax
Alex
2 months
1
0
4
@xaitax
Alex
2 months
🔓 Chrome App-Bound Encryption Decryption v0.6 just levelled up: it now unlocks the recently introduced ABE-protected passwords and payment details (yes, even your 💳)!. 🚀 Can’t wait to see Device-Bound Session Credentials from the brilliant Google team next 🙏
Tweet media one
1
16
79