Mastering post-exploitation?
'The Hacker Playbook 3' 👌
by Peter Kim is a must-read, as it covers:
a. Actual Attack Chains,
b. Evasion Techniques,
c. Red Team Strategies.
Practical over theory.
Link: digtvbg.com/files/books-...
#RedTeam #OffSec #infosec
Mastering post-exploitation?
'The Hacker Playbook 3' 👌
by Peter Kim is a must-read, as it covers:
a. Actual Attack Chains,
b. Evasion Techniques,
c. Red Team Strategies.
Practical over theory.
Link: digtvbg.com/files/books-...
#RedTeam #OffSec #infosec
Use hardware breakpoints via 'SetThreadContext' to hijack execution flow without modifying code.
Silent, reversible & hard to detect.
#RedTeam #Malware #infosec #cybersecurity #bugbounty
Use hardware breakpoints via 'SetThreadContext' to hijack execution flow without modifying code.
Silent, reversible & hard to detect.
#RedTeam #Malware #infosec #cybersecurity #bugbounty
⚡Stealthy, portable & packed with offensive tools, as real security pros test anytime, anywhere.
🔍 Topic: medium.com/@mawgoud/bui...
#KaliLinux #CyberSecurity #Infosec
⚡Stealthy, portable & packed with offensive tools, as real security pros test anytime, anywhere.
🔍 Topic: medium.com/@mawgoud/bui...
#KaliLinux #CyberSecurity #Infosec
Once the king of VoIP, now just a ghost in the digital graveyard. ☠️
From P2P-powered resilience to Microsoft's EDR-infested bloat, it never stood a chance.
Source: mybroadband.co.za/news/interne...
#Skype #Tech #VoIP #EDR #Teams #Zoom
CVE-2025-22224,
CVE-2025-22225,
CVE-2025-22226.
Attackers with admin access can chain these to escape VM sandboxes & control the hypervisor.
#VMware #ZeroDay #CyberSecurity #Infosec #Cybersecurity
Source: www.infosecurity-magazine.com/news/vmware-...
CVE-2025-22224,
CVE-2025-22225,
CVE-2025-22226.
Attackers with admin access can chain these to escape VM sandboxes & control the hypervisor.
#VMware #ZeroDay #CyberSecurity #Infosec #Cybersecurity
Source: www.infosecurity-magazine.com/news/vmware-...
PatchGuard doesn’t.
Instead of unhooking,
do this ... redirect execution using Heaven’s Gate (switching to 64-bit from 32-bit in WoW64) / indirect syscalls.
Stay ahead, stay silent. 🕵️♂️
#RedTeam #Malware #infosec #cybersecurity #bugbounty #EDR #WoW64
PatchGuard doesn’t.
Instead of unhooking,
do this ... redirect execution using Heaven’s Gate (switching to 64-bit from 32-bit in WoW64) / indirect syscalls.
Stay ahead, stay silent. 🕵️♂️
#RedTeam #Malware #infosec #cybersecurity #bugbounty #EDR #WoW64
Store shellcode in an atom, retrieve it in a remote process, and execute via callback.
Avoids common memory scanning detections.
#RedTeam #EDREvasion #Infosec #CyberSecurity
Store shellcode in an atom, retrieve it in a remote process, and execute via callback.
Avoids common memory scanning detections.
#RedTeam #EDREvasion #Infosec #CyberSecurity
--Ideal for on-the-go cybersecurity assessments.
🔍Details: mobile-hacker.com/2025/02/26/b...
#Pentesting #Infosec #KaliLinux #RaspberryPi #cybersecurity
--Ideal for on-the-go cybersecurity assessments.
🔍Details: mobile-hacker.com/2025/02/26/b...
#Pentesting #Infosec #KaliLinux #RaspberryPi #cybersecurity
If you're not monitoring OAuth token activity, you're flying blind.
Stay vigilant.
#CyberSecurity #AITM #OAuth #infosec #MiTM
github.com/zolderio/AIT...
If you're not monitoring OAuth token activity, you're flying blind.
Stay vigilant.
#CyberSecurity #AITM #OAuth #infosec #MiTM
github.com/zolderio/AIT...
Are novel training paradigms (e.g., retrieval-augmented generation, improved instruction tuning) playing a larger role?
Feb, 2025
#AI #MachineLearning #LLMs #NLP #DeepLearning #Grok
Are novel training paradigms (e.g., retrieval-augmented generation, improved instruction tuning) playing a larger role?
Feb, 2025
#AI #MachineLearning #LLMs #NLP #DeepLearning #Grok
Let's talk about Active Directory (AD) security.
Attackers 'love' targeting AD for domain admin privileges.
Here's a thread on the top techniques they use!
Image Credit: (cyber.gov.au, 2024)
A Thread 1/10🧵
#CyberSecurity #infosec #CVE
Let's talk about Active Directory (AD) security.
Attackers 'love' targeting AD for domain admin privileges.
Here's a thread on the top techniques they use!
Image Credit: (cyber.gov.au, 2024)
A Thread 1/10🧵
#CyberSecurity #infosec #CVE
🔬What IF: Scientists Choose Rust Over Python for AI Development.
📖 Read the full story ..
🔗https://mawgoud.medium.com/earth-72-scientists-adapted-rust-instead-of-python-for-artificial-intelligence-development-84b705459613
#AI #Rust #Python #Tech #Multiverse #ML
👉 Full Report: thehackernews.com/2025/02/deep...
#Cybersecurity #Privacy #Bug #Encryption #Tech #News #Security #TikTok #DeepSeek #OpenAI
👉 Full Report: thehackernews.com/2025/02/deep...
#Cybersecurity #Privacy #Bug #Encryption #Tech #News #Security #TikTok #DeepSeek #OpenAI
blog.compass-security.com/2024/12/a-ni...
blog.compass-security.com/2024/12/a-ni...
Enum Windows accounts (spray?):
snmpwalk -c public -v1 $TARGET 1.3.6.1.4.1.77.1.2.25
#hacking #redteam
🕵️♂️ Malware loves to check for debuggers this way ... feed it garbage & watch it fail.
#ReverseEngineering #Malware #infosec #bug #exploitation #pentesting
🕵️♂️ Malware loves to check for debuggers this way ... feed it garbage & watch it fail.
#ReverseEngineering #Malware #infosec #bug #exploitation #pentesting
your sensitive data is likely going to the USA. Do you know where it's stored & how it's used?
Time to think about AI data security!
#AI #Privacy #OpenAI #ChatGPT #DeepSeek #Tech #data
I believe the 'formal' title for that can fit in this case:
Salt Typhoon Cyberattack 2024:
The Largest Telecom Hack in the US History.
A Thread 🧵
+
📎Sources ↷
I believe the 'formal' title for that can fit in this case:
Salt Typhoon Cyberattack 2024:
The Largest Telecom Hack in the US History.
A Thread 🧵
+
📎Sources ↷
#AI #Copyright #DataPrivacy #Privacy #OpenAI #Google #Microsoft #Tech #Meme #BigTech #Privacy #MachineLearning #ML #DeepSeekR1 #ArtificialIntelligence
#AI #Copyright #DataPrivacy #Privacy #OpenAI #Google #Microsoft #Tech #Meme #BigTech #Privacy #MachineLearning #ML #DeepSeekR1 #ArtificialIntelligence
Hook 'NtMapViewOfSection' instead.
Most payloads get mapped before execution, making it a solid choke point for EDR logic.
Timing is everything. ⏳
#ThreatHunting #Malware #Infosec #EDR
Hook 'NtMapViewOfSection' instead.
Most payloads get mapped before execution, making it a solid choke point for EDR logic.
Timing is everything. ⏳
#ThreatHunting #Malware #Infosec #EDR
🗞️ Don't miss Nextron Systems' latest piece: 'Cyber Security 2025: Practical Trends Beyond the Hype.'
They cut through the noise to highlight threats like supply chain attacks and token abuse.
Link: www.nextron-systems.com/2025/02/03/c...
#CyberSecurity #SupplyChain #Infosec
🗞️ Don't miss Nextron Systems' latest piece: 'Cyber Security 2025: Practical Trends Beyond the Hype.'
They cut through the noise to highlight threats like supply chain attacks and token abuse.
Link: www.nextron-systems.com/2025/02/03/c...
#CyberSecurity #SupplyChain #Infosec