Zer0 Byte
@zer0byt3
Followers
920
Following
5K
Media
51
Statuses
7K
#netsec / #techno blog. Strong believer of PoC || GTFO
In Your Web Cache.
Joined July 2011
Always a great experience with @qatarairways! Heading back to NYC from Doha and the service has been outstanding as usual. Huge appreciation for crew member Anna for being so kind and helpful. Exceptional service! โค๏ธ
0
0
0
Thank you, young art student person place or thing. It is very nice. I didn't see the face behind everything originally because I don't have my glasses on (I'm old and stinky).
7
13
256
@shireenrasul.art painted this incredible piece for me. blend of evrything I live & breathe. From the #VXUnderground flame on the top right, the @wearedefcon logo on the ๐ ๐๏ธ, the Zer0byte โ0โ on the ๐๐๏ธ, @spuxo on the ๐ side of the face, and the ๐ฆ
on the right. #cybercyber
1
1
2
Another "old but gold" little trick, harkening back to @mubix's blog post waaay back in 2013: "Stealing passwords every time they change" -- creating a Password Filter & adding it to Windows Registry. A clever persistence trick to exfiltrate credz. Video: https://t.co/JCrtv3GoB8
4
57
385
Defcon Workshop: Killing and Silencing EDR Agents Like an Adversary
github.com
Contribute to arosenmund/defcon33_silence_kill_edr development by creating an account on GitHub.
2
73
250
.@h313n_0f_t0r while be at DEFCON representing us. She will have several different limited edition vx-underground stickers. Two are holographic. One is glow-in-the-dark. If you see her say "Hello" and grab a sticker.
24
34
719
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. https://t.co/EY5Z53w1ZT
5
263
598
Did you know that Azure Join Devices has a database that stores all the actions the Azure user has performed on the device? It's inside user\..\appdata\local\connectedDevicePlatform\AAD.<guid>\activitiesCache ๐ซฃ I wonder where MS sends this information.
10
52
351
TeamViewer - @whynotsecurity TL;DR: TeamViewer stored user passwords encrypted with AES-128-CBC with they key of 0602000000a400005253413100040000 and iv of 0100010067244F436E6762F25EA8D704 in the Windows registry. https://t.co/0Cbwvu4ZgA
whynotsecurity.com
Oh man where to even begin with this one. This was a crazy ride and I learned a ton along the way.
11
271
1K
A Unified Platform for Adversary Emulation and Red Team Operations
github.com
Adversary simulation and Red teaming platform with AI - FunnyWolf/Viper
2
104
311
It is not just a tab.
0
0
0
the darkest day in streaming history ๐ค
@MikeBenzCyber Never forget the 2024 Tab Disaster ๐
237
162
1K
A 7th grader following my 3 minute tutorial on building with Grok 3 and Replit. The future is bright.
216
674
16K
From the BlackBasta chat logs, I obtained access to GoblinCrypt, a private malware encryption tool used to bypass EDR/AV. With it, I pivoted into each malware samples and C2 address. Hereโs the full list: https://t.co/08lDSQhYFT
5
60
274
As a pentester the report is what you're being paid for. All of the time you spend having fun (and stressing) hacking is a bonus. A great report will showcase all the hard work you do while also providing your client a guide to make their environment safer! Resources: Hack for
4
97
509
it took me so much time to finish this exploit but I finally did it! my first guest-to-host virtualbox escape is finally ready, using a combination of 2 bugs I can target the latest version :) Eternal thank you to my dear friend Corentin @OnlyTheDuck for constantly encouraging me
40
136
1K