@Evi1Grey5 Profile picture

DSAS by INJECT

@Evi1Grey5

✕ ANONYMOUS SERVERS WITH #С2 INFRASTRUCTURE ✕ CRYPT FILE SERVICE X #REDTEAM and FOUNDER of the SERVICE INJECT https://t.co/P0TXp5eL9D / https://t.co/K5bgCBd3NF

Similar User
Thomas Seigneuret photo

@_zblurx

Octoberfest7 photo

@Octoberfest73

Joas Antonio photo

@C0d3Cr4zy

Cybertix photo

@thecybertix

HADESS photo

@Hadess_security

Aurélien Chalot photo

@Defte_

Mairon photo

@ZeroMemoryEx

VCSLab photo

@vcslab

Charles Fol photo

@cfreal_

Đào Trọng Nghĩa photo

@nghiadt1098

Nick Powers photo

@zyn3rgy

sean photo

@seanyeoh

Hexacon photo

@hexacon_fr

CodeX photo

@codex_tf2

Zach Hanley photo

@hacks_zach

Pinned

🆕 We offer an isolated test environment with real EDR solutions (CrowdStrike, Carbon Black, SentinelOne, PaloAlto) in the near future, we will expand the choice of edr. A customized test environment with maximum isolation from the main network, #DSAS #EDRs #AV #TESTENVIRONMENT

Tweet Image 1

#Lsass dump Combining RtlCreateProcessReflection plus NanoDump Writer to avoid MiniDump callback api. github.com/wolfcod/lsassd…

Tweet Image 1

RustiveDump #LSASS memory #dumper using only NTAPIs, creating a minimal minidump, built in Rust with no_std and independent of the C runtime (CRT). It supports XOR encryption and remote file transmission. github.com/safedv/Rustive…

Tweet Image 1

🖥 Let's analyze one of the ways to bypass the smart screen and write our own simple cryptor that runs the shellcode #payload #obfuscate github.com/Evi1Grey5/Bypa…

Tweet Image 1

L / Dropper Black Messa Black Messa Dropper effectively bypasses antivirus and any EDR solutions. #dropper #loader github.com/Evi1Grey5/Drop…

Tweet Image 1

learn how to bypass and kill AV/EDR. 10 training modules, each of which will teach you how to act in a given situation and bypass even the most difficult defenses. Registration is already open. #killedr #bypassedr #edr #av t.me/INJECTCRYPT/193

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.