@Sarthak_0000 Profile picture

Sarthak Saini

@Sarthak_0000

Security enthusiast || Love to Automate || Security Researcher || opinions are my own ;)

Similar User
Sagar M Parmar photo

@sagarparmar121

Pratik Yadav photo

@pratikyadav7_

Bipin Jitiya photo

@win3zz

pwnmachine photo

@princechaddha

Shubham Patel photo

@Shubham_4500

Kuba Gretzky photo

@mrgretzky

Aakash Choudhary photo

@LearnerHunter

luffydragneel photo

@Hackers_Guild

Swaroop Yermalkar 👨🏻‍💻 photo

@swaroopsy

Gareth Heyes \u2028 photo

@garethheyes

Swissky photo

@pentest_swissky

Synack Red Team photo

@SynackRedTeam

Gaurav Narwani photo

@gauravnarwani97

Ravi Rajput photo

@infosecRavi

Mr.Un1k0d3r photo

@MrUn1k0d3r

Pinned

Hi all, For past three years, we have have been maintaining a resource channel on discord, Today we are releasing a fork of @ippsec 's website for our own server, thanks to ippsec for the foundation of the website. Link: search.redteam.fail

Tweet Image 1

over the years our discord server created by @Sarthak_0000 has been collecting various red team resources. so now we have a search engine to search this resources search.redteam.fail



Sarthak Saini Reposted

New technique to bypassing EDRs with EDR-Preloading. Tldr: blocking EDR from loading it's DLL into a process preventing the deployment of user land hooks. malwaretech.com/2024/02/bypass…


Sarthak Saini Reposted

My first research and tool are finally out. If you want to deep dive into some CLR internals and understand how we can abuse it to blend-in within its own logic go check it out. Hope you'll enjoy the read. ipslav.github.io/2023-12-12-let…


Sarthak Saini Reposted

My latest blog post about avoiding kernel triggered EDR memory scans via Caro-Kann PoC is now released: 🔥 r-tec.net/r-tec-blog-pro…


Sarthak Saini Reposted

Here's Process Stomping injection and how you can use it in a Mockingjay-ish way to load a Beacon on a exe's RWX section using sRDI. Check it out! Blog: naksyn.com/edr%20evasion/… Tool: github.com/naksyn/Process… Thanks to @hasherezade and @monoxgas for their awesome work


Sarthak Saini Reposted

It's time to share the tips and tricks I used to dig into the .NET runtime implementation: it is not as complicated as it might seem :^) chnasarre.medium.com/bd67d884f8da?s…


Sarthak Saini Reposted

Just finished Grand Theft Auto – RF Locks Hacking Flipper-Zero Edition Part 2 chaos-lab.blogspot.com/2023/10/grand-…

Tweet Image 1

Sarthak Saini Reposted

We are excited to share a new "threadless" process injection technique by @dec0ne This new technique utilizes DLL Notification Callbacks in the remote process to trigger the shellcode github.com/ShorSec/DllNot… Detailed blog post: shorsec.io/blog/dll-notif… Demo video in next tweet


Sarthak Saini Reposted

Are you into cloud hacking? Got an MS Graph token but unsure what to do with it? Do you want to forge your own primary refresh token with a malicious device registration. I got you covered. Bypass MFA like a boss with this guide. #Azure trustedsec.com/blog/hacking-y…


Sarthak Saini Reposted

MalDev Academy is ready! Website: MaldevAcademy[.]com Launch date: April 16th, 2023 - 32 Beginner modules - 49 Intermediate modules - 10 Advanced modules - 20 in the works for updates in the next few months - 65 Custom code samples Very fair pricing, starting at 249$ @NUL0x4C


Sarthak Saini Reposted

New technique to dump NTDS remotely WITHOUT DSRUAPI: github.com/zblurx/certsync (Golden Certificates + UnPAC the hash automation) Thanks @ly4k_ for certipy, which my script heavily relies on.


Sarthak Saini Reposted

Bypass EDR Hooks by patching NT API stub, and resolving SSNs and syscall instructions at runtime github.com/D1rkMtr/Unhook…

Tweet Image 1

Sarthak Saini Reposted

Hello ! I've just released my first blogpost about VLAN Hopping and how to exploit and mitigate it. Post is available in French 🇫🇷 and English 🇬🇧. Feel free to check it out and give me any kind of feedback 😄 bwlryq.net/posts/vlan_hop…


Sarthak Saini Reposted

Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard. These techniques also work on victims logged on before the server was compromised. research.ifcr.dk/pass-the-chall…


Sarthak Saini Reposted

I pushed all the NtCreateUserProcess stuff to my D/Invoke wiki. dinvoke.net/en/ntdll/NtCre…


Sarthak Saini Reposted

Check out this fantastic blog post about detecting and evading sandboxing through time-based evasion written by a friend of mine: shubakki.github.io/posts/2022/12/…


Sarthak Saini Reposted

Execute commands as another user w/t dumping LSASS or touching the ADCS server ? Thanks to @Defte_ a new module has been added to CrackMapExec 🚀 The module will impersonate any logged on user to exec command as "this" user (system, domain user etc) 🔥

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.