Alex Profile
Alex

@xaitax

Followers
3K
Following
1K
Media
340
Statuses
4K

Turning hacker instincts into boardroom insights.

Switzerland
Joined March 2010
Don't wanna be here? Send us removal request.
@xaitax
Alex
9 days
πŸ” NTSleuth is now live! A new comprehensive Windows Syscall Extraction & Analysis Framework. Still early stages with many ideas brewing, but hope it helps some of you! ✨ Features: β€’ Extracts thousands of syscalls from ntdll.dll & win32u.dll as well as and WOW64 variants β€’
6
48
175
@mikko
@mikko
5 days
The Gentlemen Hackers interviewing Halvar Flake: https://t.co/FCkkM66LE4
Tweet media one
3
24
126
@xaitax
Alex
8 days
[6/x] But now I'd appreciate many more datasets from the community to add to it. Any feedback welcome and please submit your extracted JSONs at https://t.co/kfpQFXvmWB πŸ’ͺ🏻
Tweet card summary image
github.com
Comprehensive Windows Syscall Extraction & Analysis Framework - xaitax/NTSleuth
0
0
7
@xaitax
Alex
8 days
[5/x] Probably my favourite: Compare syscalls across different Windows versions and architectures. What exactly has changed.
Tweet media one
0
1
13
@xaitax
Alex
8 days
[4/x] Display syscall number, parameters, SAL annotation, convention and more.
Tweet media one
Tweet media two
0
0
3
@xaitax
Alex
8 days
[3/x] Browse, search, sort, filter by name, module if it has an alias or inputs.
Tweet media one
0
0
4
@xaitax
Alex
8 days
[2/x] Once you select a dataset you get an overview about the particular extraction generated by NTSleuth.
Tweet media one
0
0
8
@xaitax
Alex
8 days
[1/x] I would love to make NTSleuth a community driven project so the whole research community can profit off it. For that I created https://t.co/h0VXonbtP1 which can serve as a syscall database across Windows architectures, builds, versions. Not many datasets yet but will
Tweet media one
10
34
153
@xaitax
Alex
9 days
Initital Syscall / Parameter Extraction
Tweet media one
0
0
2
@xaitax
Alex
9 days
Syscall Lookup Mode
Tweet media one
0
0
7
@xaitax
Alex
10 days
Tweet media one
0
0
4
@xaitax
Alex
10 days
πŸ” Working on something interesting: NTSleuth - a Windows syscall extraction tool with a twist... Would anyone be interested in a tool that: 🎯 Extracts ALL syscalls from Windows (ARM64/x64) πŸ€– Auto-resolves function parameters πŸ“Š Found 2,461 syscalls on Win11/ARM64 πŸ“ Outputs
Tweet media one
Tweet media two
7
64
308
@xaitax
Alex
11 days
Smelly needs someone reliable. Free cat emojis and memes! 😼
0
0
1
@xaitax
Alex
16 days
Say hello to ChromElevator (formerly Chrome App-Bound Decryption). Just dropped v0.15.0: πŸš€ One command to rule them all - can hit every installed Chromium browsers at once. 🀫 More stealthy discovery as it finds browser paths by querying the registry with direct syscalls. No
Tweet media one
9
61
203
@b1n4r1b01
binaryboy
17 days
Brief info and POC for this week's Apple 0click iOS 18.6.1 RCE bug CVE-2025-43300 https://t.co/EL3qg56N8X
Tweet media one
15
217
785
@flipper_zero
Flipper Zero
17 days
Right now, the media is hyping up a story that a SECRET HACKER FIRMWARE FOR FLIPPER ZERO HAS APPEARED ON THE DARKNET THAT CAN HACK ANY CAR!!!11 WE’RE ALL IN DANGER. Let’s break it down and see if that’s actually true (spoiler: it’s not): https://t.co/JZPz5KZKcP
Tweet media one
27
285
2K
@xaitax
Alex
18 days
πŸ›‘οΈ ARM64 Call Stack Spoofing Framework for Windows! Just dropped something new for EDR evasion on ARM64, designed to cloak execution by manipulating the call stack. πŸ”Ž Hunts for legitimate return addresses ("gadgets") in ntdll.dll 🎲 Randomizes gadgets to resist signature-based
Tweet media one
0
2
7
@xaitax
Alex
18 days
Stop blaming AI/LLMs for insecure code. That’s (mostly) on us. I keep seeing more and more articles saying that "vibe-coded" apps are insecure (by default). That’s too easy. And a cheap shot. Proper prompting helps and the real win comes with 𝐩𝐫𝐨𝐦𝐩𝐭𝐒𝐧𝐠 +
Tweet media one
0
0
4