Similar User
@0x1BE
@Pwn3dx
@0xnzs
@SaudiYouthOpp
@s4cript
@EricaZelic
@hereioz
@balahmadii
@irsheidat1
@AriPlachta
@Ryan_412_
@rytickt
@Thamerz88
@slh_1993
@typing0x
I've developed a new Red-Teaming tool called NoArgs. It dynamically hooks into Windows APIs to manipulate and hide process arguments. By injecting it into a cmd process, it hides the arguments of every newly spawned processes at runtime, without leaving traces for logging…
🫡
NoArgs - Tool Designed To Dynamically Spoof And Conceal Process Arguments While Staying Undetected dlvr.it/T5ZvVn
السلام عليكم🤖👋 واخيراً رجعنا لكم بالثريد الاخير ل #اختراق_الهاردوير لجهاز Game&Watch في اخر ثرد اكتشفنا ان ال ROM الخارجية ال Entropy لها عالية وهذا يدل انها مشفرة والجهاز مفعل Level 1 protection ونقدر نقراء فقط ال MCU RAM او ال SRAM كلها نفس المعنى فرق مسميات مثل ال Flash/ROM
مقالة جميله جدا عن Kerberos Delegation caramellaapp.com/0xsa/gnV0Rqo96… للاسف ماعرف حساب الي كتبها عشان اسوي له منشن ولكن هذا رابط حسابه في لينكدان linkedin.com/in/saeed-alzah…
NoArgs: dynamically spoof and conceal process arguments while staying undetected securityonline.info/noargs-dynamic…
In my recent project, which is still in early stages, I’ve developed a Custom User-Defined Reflective Loader. It fetches an encrypted payload from an external server without saving it on disk and then directly loads the program into memory. It takes care of parsing the program's…
Happy to say that i got my #OSED today, really fun course and a very challenging exam but worth it nonetheless. Thanks @offsectraining
السلام عليكم ، كتبت مقاله تتكلم عن اساليب تخطي برامج الحمايه ب استخدام الSyscalls ،وتعتبر الجزء الثاني المكمل لمقالتي السابقه.. تكلمت بالتفاصيل عن: Syscalls SysWhispers PEB HellsGate HalosGate Direct vs Indirect Syscalls ومواضيع اخرى.. اتمنى تفيدكم :) caramellaapp.com/ohaz/gsq5U01az…
السلام عليكم ، كتبت مقاله تتكلم عن اساليب تخطي برامج الحمايه .. تكلمت بالتفاصيل عن: AntiMalware Scan Interface (AMSI) Event Tracing for Windows (ETW) Userland Windows API Hooking اتمنى تفيدكم وبأذن الله القادم اقوى :) caramellaapp.com/ohaz/i83Jd9veR…
Elevate token from Administrator to NT AUTHORITY/SYSTEM by stealing a SYSTEM process token and spawn a shell with it. github.com/oh-az/elevateT…
I made an online string obfuscation tool that uses various ways of mathematical operations to encrypt a string, and outputs the C/C++ format. And the decryption should be in memory without needing a key since its only math operations. I hosted it here: ohaz.me
I made a simple tool written in C to mutate any executable hash and bypass Windows Group Policy to launch cmd or powershell. It also bypasses any static signature based detection without interfering with the execution flow. #redteam github.com/oh-az/HashMorp…
United States Trends
- 1. Cowboys 67,7 B posts
- 2. Clippers 9.708 posts
- 3. Texans 55 B posts
- 4. Norman Powell 1.680 posts
- 5. Cooper Rush 11,6 B posts
- 6. Jerry 42,2 B posts
- 7. Mike McCarthy 3.116 posts
- 8. Mixon 17,3 B posts
- 9. Trey Lance 3.101 posts
- 10. Lindy 3.319 posts
- 11. Dyson Daniels 2.544 posts
- 12. Keon Ellis 1.583 posts
- 13. #WWERaw 60,9 B posts
- 14. Harden 18,3 B posts
- 15. sabrina 103 B posts
- 16. Sixers 10,9 B posts
- 17. #HOUvsDAL 9.434 posts
- 18. The Herta 19,3 B posts
- 19. Pulisic 24 B posts
- 20. #AskShadow 6.911 posts
Who to follow
-
Talal
@0x1BE -
Fahad
@Pwn3dx -
Nadim Alzahrani
@0xnzs -
Saudi Youth Opportunities
@SaudiYouthOpp -
Fahad
@s4cript -
IAM!ERICA
@EricaZelic -
Hereioz
@hereioz -
بندر يوسف 🇸🇦
@balahmadii -
Abdalazez irsheidat
@irsheidat1 -
Ari Plachta
@AriPlachta -
Ryan412
@Ryan_412_ -
Ry.team|تذاكر🎟️
@rytickt -
T3ster
@Thamerz88 -
Salah
@slh_1993 -
بَيْرَق
@typing0x
Something went wrong.
Something went wrong.