Built something super satisfying โ truly and tiny position independent code, cross-compiled from any OS to any OS. ๐
09.04.2025 19:34 โ ๐ 4 ๐ 0 ๐ฌ 0 ๐ 0Built something super satisfying โ truly and tiny position independent code, cross-compiled from any OS to any OS. ๐
09.04.2025 19:34 โ ๐ 4 ๐ 0 ๐ฌ 0 ๐ 0They shouldnโt even connect them in the first placeโฆ ๐ค
08.02.2025 20:57 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0โThe primary goal of this campaign is to facilitate unauthorized ATM withdrawals from the victimsโ bank accounts. This was achieved by relaying the near field communication (NFC) data from the victimsโ physical payment cards, via their compromised Android smartphones.โ ๐ฅ
08.02.2025 20:55 โ ๐ 1 ๐ 0 ๐ฌ 0 ๐ 0New blog post on the abuse of the IDispatch COM interface to get unexpected objects loaded into a process. Demoed by using this to get arbitrary code execution in a PPL process. googleprojectzero.blogspot.com/2025/01/wind...
30.01.2025 18:37 โ ๐ 65 ๐ 41 ๐ฌ 2 ๐ 0This is going to be amazing!
26.12.2024 18:18 โ ๐ 0 ๐ 0 ๐ฌ 0 ๐ 0Acceptance email from the CFP board.
I will be presenting at NULLCON Goa 2025! ๐ฎ๐ณ
The hidden ART of rolling shellcode decryption. A dive into a new shellcode loading technique!
Today, AmberWolf released two blog posts and our tool "NachoVPN" to target vulnerabilities in major VPNs, including CVE-2024-29014 (SonicWall NetExtender SYSTEM RCE) and CVE-2024-5921 (Palo Alto GlobalProtect RCE and Priv Esc), after our SANS HackFest presentation.๐งต
26.11.2024 11:17 โ ๐ 6 ๐ 5 ๐ฌ 1 ๐ 1I used to mute a lot of words and hashtags that I wasnโt interested in on X. I see that this is also possible on Bluesky, so might be worth a try!
14.11.2024 20:37 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
Our @BSidesLondon Ivanti & Pulse Secure VPN kernel exploitation talk is live! The presentation is about shared research of my colleague Alex and me.
CVE-2023-38043, CVE-2023-35080 & CVE-2023-38543
www.youtube.com/watch?v=hmYK...
I dived into exploiting leaked code signing certificates to sign malware โ. A technique that has been actively abused in the wild by threat actors for a long time.
Blog post: tij.me/blog/finding...
Hello world!
21.11.2023 22:00 โ ๐ 3 ๐ 0 ๐ฌ 0 ๐ 0