|
Carl Schou / vm
@
vm_call
Denmark
|
|
github.com/vmcall bored high school student.
|
|
|
278
Tweets
|
91
Following
|
1,201
Followers
|
| Tweets |
|
Carl Schou / vm
@vm_call
|
Feb 2 |
|
Okay guys, enough with the jokes. Why are cheaters renaming themselves to "vm_call fan" 😅 twitter.com/HecticPXL/stat…
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 30 |
|
Doxed
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 29 |
|
it'll moon bro just mortgage your house
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 29 |
|
Yeah sorry my man, some time in the future i will sit down and change the colors to a proper dark theme, but right now i'm using stock (slightly modified contrast) style
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 28 |
|
> last person in the shout out list pic.twitter.com/VKuL53kgk1
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 26 |
|
check your dm
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 26 |
|
I ported vmcall.blog from Jekyll to Wordpress in hopes that the "comments" feature would be used to provide meaningful commentary to my content. Let's just say that I am pleased with my decision pic.twitter.com/mbiJ8IWPus
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 26 |
|
make olly proud and drop it for internet points
|
||
|
|
||
| Carl Schou / vm retweeted | ||
|
Luca Marcelli
@layle_ctf
|
Jan 26 |
|
Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;)
Don't forget to patch! pic.twitter.com/FekupjS6qG
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
Yeah i'm ecstatic that they've begun virtualizing shellcode now, makes it more fun for me
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
They've never responded to my messages :( so i guess i'll just publish everything as i know they follow me on twitter, that will get flaws fixed
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
@TheBattlEye of course this is all fun and games, but honestly, if you guys would like some consultancy on how to battle cheating, my dms are open :) you don't seem to respond to my messages
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
Hackers have been abusing a poor integrity check in BattlEye to completely circumvent game protection mechanisms. This has allowed cheat communities to intercept and modify every single piece information sent by the anti cheat to the respective servers. vmcall.blog/battleye-commu…
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
believe it or not but not everything i tweet is a shitpost
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
Credit to @ollypwn for publishing the first PoC
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
To be more precise: rename any device driver on disk so that the file path ends with the pattern Callback?????.sys and BattlEye will upload it over UDP in chunks of 0x27EA (no idea why, maybe some protocol limitation)
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
They'll upload device drivers from your computer if they match a certain criteria, it's fucking ridiculous
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
Call me petty but i have no remorse for a company that literally steals personal files from my computer. We can keep doing this all year baby #secretclub pic.twitter.com/qFMyTX8thX
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 24 |
|
BattlEye has begun virtualising all new shellcode, 1:0 to the secret club. Confirms that the developers are lurking my twitter - next article will be released shortly, which will allow you to hook BattlEye while bypassing their internal integrity checks :) stay put
|
||
|
|
||
|
Carl Schou / vm
@vm_call
|
Jan 23 |
|
hvad laver du oppe efter din sengetid, gå i seng
|
||
|
|
||