@sahruldotid Profile picture

Syahrul Akbar R

@sahruldotid

Vulnerably Researcher (wannabe) | Tweets are my own | 🗣️ English, Indonesia

Similar User
Rootbakar Official photo

@rootbakar

HawkEye photo

@_3venthorizon

Adib Dzulfikar photo

@adib_dz

P0wden photo

@p0wden

Han* photo

@YosuaKristanto

Vaints photo

@vaints_

G123N1Nj4 photo

@G123Nj4

Pwnsploit photo

@pwnsploit

Dark Phoenix photo

@Fat_BoyLucifier

huyK photo

@huyK85770870

Anil Arelli photo

@a_arelli_

kingtoto photo

@kingtot31410584

rugb photo

@Bet0_Shinoda

Fauzan Maghribi photo

@FauzanMaghribi

Syahrul Akbar R Reposted

New Windows Driver Signature bypass allows kernel rootkit installs - @billtoulas bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…">bleepingcomputer.com/news/security/…


Syahrul Akbar R Reposted

As promised, I just dropped a dozen new sandbox escape vulnerabilities at #POC2024 If you missed the talk, here is the blog post: jhftss.github.io/A-New-Era-of-m… Slides: github.com/jhftss/jhftss.… Enjoy and find your own bugs 😎

Actually, 15+ new sandbox escape vulnerabilities discovered. All of them are simple logic issues. You may find your own sandbox 0-days by yourself after listening to this talk!🔥🔥🔥



Syahrul Akbar R Reposted

The Kaspersky incident, the Sophos report, and now the Unit 42 one all push me towards never installing an EDR of any flavor on personal devices.


Syahrul Akbar R Reposted

Mine and @_dirkjan's @defcon talk, Abusing Windows Hello Without a Severed Hand went live yesterday. We discuss both privileged and unprivileged Windows Hello abuse. Hope you all enjoy it. youtu.be/mFJ-NUnFBac?fe…


Syahrul Akbar R Reposted

Invoke-SMBRemoting. utilizes the SMB protocol to establish a connection with the target machine, and sends commands (and receives outputs) using Named Pipes. by @L3o4j github.com/Leo4j/Invoke-S…


Syahrul Akbar R Reposted

The next generation of binary obfuscation for the Windows platform is now public. No source code annotations required, full SEH support, CET support, ACG compliant. Join the Discord: discord.gg/VMUpEP2rNg Website: codedefender.io


Syahrul Akbar R Reposted

Dehooking for babies I'm sitting on this one for a while now, but Trend never ack anything. Changing your exe name with explorer.exe or Chrome.exe avoid the injection of the DLL and the setup of the userland hooks... Can be easily found with the DLL reverse engineering


Syahrul Akbar R Reposted

My blog is live! Decided to share a few thoughts on SQL injection polyglot payloads for my first post. RTs and feedback greatly appreciated nastystereo.com/security/sqli-…

Tweet Image 1

Syahrul Akbar R Reposted

I've written a post on SELinux and some public bypasses for Android kernel exploitation. It's especially relevant for Samsung and Huawei devices due to their use of hypervisors. Check it out here: klecko.github.io/posts/selinux-…


Syahrul Akbar R Reposted

In case you weren't at #nohat2024 but still wanna nerd over RPC, authentication and what's in between, we summarized everything to a blogpost as well. Slides and PoC are on our Github as well. akamai.com/blog/security-…


Syahrul Akbar R Reposted

Born too late to buy a home. Born just in time to have my personal data constantly leaked online.


Syahrul Akbar R Reposted

New Blog Alert! 🚨 Introducing Early Cascade Injection, a stealthy process injection technique that targets Windows process creation, avoids cross-process APCs, and evades top-tier EDRs. Learn how it combines Early Bird APC Injection & EDR-Preloading: outflank.nl/blog/2024/10/1…

Tweet Image 1

Syahrul Akbar R Reposted

THC RELEASE: 🎁Execute arbitrary backdoors 🚪on targets that do NOT allow execution 🙈 (noexec). Without ptrace() or mmap(). With only BASH _or_ PHP.👉Trick BASH to make (any)❗️SYSCALLS ❗️to the kernel. 🤪 #ISPScare iq.thc.org/bypassing-noex…

Tweet Image 1

Syahrul Akbar R Reposted

From HTTP request to ROP chain in Node.js! 🔥 Our latest blog post explains how to turn a file write vulnerability in a Node.js application into RCE – even though the target's file system is read-only: sonarsource.com/blog/why-code-…

Tweet Image 1

Syahrul Akbar R Reposted

Oh man, when your POC ends up in LWiS even though it's dropped same day! You guys are doing amazing work @badsectorlabs blog.badsectorlabs.com


Syahrul Akbar R Reposted

Syahrul Akbar R Reposted

Guest vs Null session on Windows - @Defte_ blog.whiteflag.io/blog/guest-vs-…


Syahrul Akbar R Reposted

An Introduction to Chrome Exploitation - Maglev Edition :: — uf0 matteomalvica.com/blog/2024/06/0…


Syahrul Akbar R Reposted

Thanks to a great article from @itm4n, I discovered a bypass to install vulnerable printer's drivers when low level users are allowed to install them on Windows allowing escalating privileges. He published a detailed explanation: itm4n.github.io/printnightmare…


Loading...

Something went wrong.


Something went wrong.