Twitter | Pretraživanje | |
Borja Merino
Security Researcher
4.691
Tweetovi
477
Pratim
2.701
Osobe koje vas prate
Tweetovi
Borja Merino proslijedio/la je tweet
Casey Smith 1. velj
Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
spotless 26. sij
Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Adam 24. sij
modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Mumbai 22. sij
ppldump : Injects MiniDumpWriteDump() Shellcode into PPL procs (lsass demo) to dump memory. Got better tools, so useless to me now. Note sometimes the threads lock after the APC is queued, causing MiniDumpWriteDump to fail. Just resume the thread(s)
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Luca Marcelli 17. sij
My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 18. sij
Windows kernel explorer: A free powerful Windows kernel research tool
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Ghidra 15. sij
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Matt Graeber 14. sij
No fancy EDR required to capture CVE-2020-0601 attempts (after patching). Just ensure you're forwarding Application log events. Currently, CVE-2020-0601 is the only Microsoft code (AFAIK) that calls the CveEventWrite API so event noise is not a concern.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Josh Lospinoso 12. sij
C++ for Hackers: How C++ can be a vital tool for infosec developers
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 11. sij
Windows Process Injection in 2019 . Nice compilation with functional examples.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
ටل 🧗 6. sij
Dear users, if you're a fan of the tool and are keen to throw a few dollarydoos at it, please head over here: All proceeds received before the end of Jan (including the current balance of USD $271) will be donated to the Rural Fire Service here in Australia.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @samykamkar
I'm highly curious about this :)
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @hlldz
Thank you!!
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Samy Kamkar 5. sij
I've developed a new technique for bypassing firewalls/NATs and producing full TCP/UDP session to targeted user. Anyone have RCE for a service that's typically only run behind NATs (eg desktop software like Sonos, Spotify, Dropbox, etc which bind to *) and want to merge projects?
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Tim Yardley 5. sij
One-Way Shellcode for firewall evasion using Out Of Band data
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @daveaitel @timyardley
bmerinofe @ Thanks a lot!! I love this topic
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @daveaitel @timyardley
Just tried with "simple" services, i.e. some C2 malware.  It is true that with complex applications this approach (handle bruteforce) like findport/tag does not work well.
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @daveaitel @timyardley
You mean while you go through all the handlers looking for the correct one?.  What type of API did you experience problems with?
Reply Retweet Označi sa "sviđa mi se"
Borja Merino 6. sij
Odgovor korisniku/ci @daveaitel @timyardley
Hi Dave! This post is amazing (shared on muy blog), Yuange exploit is worthy of study!
Reply Retweet Označi sa "sviđa mi se"
Borja Merino proslijedio/la je tweet
Hacker Fantastic 3. sij
APT34 partial tools leak (repost as this got taken down very quickly)
Reply Retweet Označi sa "sviđa mi se"