@_call_gate Profile picture

Call_gate

@_call_gate

Penetration Testing & Reverse Engineering. . . Phd, Msc (RHL), IEEE snr, CRTO, PNPT, CRTP

Call_gate Reposted

Checkout my writeup for the challenges I solved during the Block CTF 2024 that happened this week. xk0m1.github.io/2024/11/16/blo… GGs <3


Call_gate Reposted

Rant - peace out! TL;DR I agree with your statements Not every red team/er has the capability to think like a TA. Just like not every red teamer is a red teamer. Being on a RT doesn't make you a red teamer. Very few even get to see the IR side or work IR. Most commercial RTs…


Call_gate Reposted

#Purple_Team_Exercises Purple Team Exercise Framework (PTEF) github.com/scythe-io/purp… ]-> CISO's Guide to Purple Teaming (.pdf) ]-> Continuous Purple Teaming: A Practical Approach for Strengthening Your Offensive Capabilities


Call_gate Reposted

Big fan of this streamlined malware analysis setup, from @herrcore: youtu.be/adAr0KBJm4U?si…


Call_gate Reposted

A recent article reveals that hackers are leveraging Excel files to deploy a variant of the Remcos RAT, highlighting its advanced techniques and the threat it poses to Windows users. #CyberSecurity #Malware ift.tt/tNyrqOn


Call_gate Reposted

Just published: 'MacOS Malware Surges as Corporate Usage Grows'. EDR is giving us broader visibility, while DPRK's targeting of macOS is escalating fast. A throwback to my Mac-A-Mal days, now things are on a whole different level. bit.ly/4f6lQw8

Tweet Image 1

Call_gate Reposted

Kill your AV/EDR product by getting the exact location it exists on disk (with the defrag API) and corrupting it. Bitlocker will boot on the drive but won’t be able to decrypt the data correctly. github.com/lkarlslund/nifo


Call_gate Reposted

I just released my VAC kernel-mode bypass in both GitHub and UnknownCheats, feel free to check it out it's very interesting 🙂 github.com/crvvdev/vac-by…


Call_gate Reposted

Here's my journey/blog of an entire wasted day on reversing the NTAPI call and the internals of ntdll!LdrpVectorHandlerList to write my own RtlpAddVectoredExceptionHandler from scratch. The code is hosted on my git #BRc4 bruteratel.com/research/2024/…

Tweet Image 1

Call_gate Reposted

🚧WiP Project LOST - Living Off Security tools 0xanalyst.github.io/Project-Lost/, to track security tools being utilized by pentesters/TAs to conduct activities like C2, command exec, data collection. do a pull request with your faviourite tool to add #LoLBin #threathunting #EDR


Call_gate Reposted

An EDR bypass that prevents EDRs from hooking or loading DLLs into our process by hijacking the AppVerifier layer github.com/MalwareTech/ED…


I am thrilled to announce that @IEEEorg has recognized my over 10 years of experience and contributions in Cyber Security by promoting me to Senior Member. It’s an incredible honor to be part of such a prestigious association.#CyberSecurity #SeniorMember #EngineeringLead


Call_gate Reposted

Stanford's "Probability for Computer Scientists" PDF available at: web.stanford.edu/~mossr/pdf/p4c…

Tweet Image 1

Call_gate Reposted

Efficient zero-copy networking using io_uring youtube.com/watch?v=WQ22zA…


Many thanks to my friend Andrew Stewart for sending me his incredible book (twice!), A Vulnerable System: The History of Information Security in the Computer Age. 📚 I can't wait to dive into this insightful read, which reflects Andrew's tremendous expertise. #CyberSecurity #0day

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.