@AzizWho Profile picture

ohAz

@AzizWho

infosec and stuff

Similar User
Talal photo

@0x1BE

Fahad photo

@Pwn3dx

Nadim Alzahrani photo

@0xnzs

Saudi Youth Opportunities photo

@SaudiYouthOpp

Fahad photo

@s4cript

IAM!ERICA photo

@EricaZelic

Hereioz photo

@hereioz

بندر يوسف 🇸🇦 photo

@balahmadii

Abdalazez irsheidat photo

@irsheidat1

Ari Plachta photo

@AriPlachta

Ryan412 photo

@Ryan_412_

Ry.team|تذاكر🎟️ photo

@rytickt

T3ster photo

@Thamerz88

Salah photo

@slh_1993

بَيْرَق photo

@typing0x

Pinned

I've developed a new Red-Teaming tool called NoArgs. It dynamically hooks into Windows APIs to manipulate and hide process arguments. By injecting it into a cmd process, it hides the arguments of every newly spawned processes at runtime, without leaving traces for logging…

Tweet Image 1
Tweet Image 2

🫡

NoArgs - Tool Designed To Dynamically Spoof And Conceal Process Arguments While Staying Undetected dlvr.it/T5ZvVn



ohAz Reposted

السلام عليكم🤖👋 واخيراً رجعنا لكم بالثريد الاخير ل #اختراق_الهاردوير لجهاز Game&Watch في اخر ثرد اكتشفنا ان ال ROM الخارجية ال Entropy لها عالية وهذا يدل انها مشفرة والجهاز مفعل Level 1 protection ونقدر نقراء فقط ال MCU RAM او ال SRAM كلها نفس المعنى فرق مسميات مثل ال Flash/ROM

Tweet Image 1

ohAz Reposted

مقالة جميله جدا عن Kerberos Delegation caramellaapp.com/0xsa/gnV0Rqo96… للاسف ماعرف حساب الي كتبها عشان اسوي له منشن ولكن هذا رابط حسابه في لينكدان linkedin.com/in/saeed-alzah…


In my recent project, which is still in early stages, I’ve developed a Custom User-Defined Reflective Loader. It fetches an encrypted payload from an external server without saving it on disk and then directly loads the program into memory. It takes care of parsing the program's…


Happy to say that i got my #OSED today, really fun course and a very challenging exam but worth it nonetheless. Thanks @offsectraining

Tweet Image 1

السلام عليكم ، كتبت مقاله تتكلم عن اساليب تخطي برامج الحمايه ب استخدام الSyscalls ،وتعتبر الجزء الثاني المكمل لمقالتي السابقه.. تكلمت بالتفاصيل عن: Syscalls SysWhispers PEB HellsGate HalosGate Direct vs Indirect Syscalls ومواضيع اخرى.. اتمنى تفيدكم :) caramellaapp.com/ohaz/gsq5U01az…


السلام عليكم ، كتبت مقاله تتكلم عن اساليب تخطي برامج الحمايه .. تكلمت بالتفاصيل عن: AntiMalware Scan Interface (AMSI) Event Tracing for Windows (ETW) Userland Windows API Hooking اتمنى تفيدكم وبأذن الله القادم اقوى :) caramellaapp.com/ohaz/i83Jd9veR…


Elevate token from Administrator to NT AUTHORITY/SYSTEM by stealing a SYSTEM process token and spawn a shell with it. github.com/oh-az/elevateT…


I made an online string obfuscation tool that uses various ways of mathematical operations to encrypt a string, and outputs the C/C++ format. And the decryption should be in memory without needing a key since its only math operations. I hosted it here: ohaz.me

Tweet Image 1

I made a simple tool written in C to mutate any executable hash and bypass Windows Group Policy to launch cmd or powershell. It also bypasses any static signature based detection without interfering with the execution flow. #redteam github.com/oh-az/HashMorp…


Loading...

Something went wrong.


Something went wrong.