- 📖 I’m currently working on threat hunting
- 📘 I’m currently learning everything 🤣
- 🎭 I’m looking to explore purple teaming
- ☑️ 2023 Goals: Contribute more to Open Source projects
- Best Antivirus/EDR vs Unknown Ransomware
- Adversaries Are Doing Stranger Things Part 1
- Direct System Calls For Hackers (EDR Evasion)
- From COM Object Fundamentals To UAC Bypasses - Tijme Gommers
- Hacking Windows TrustedInstaller (GOD MODE)
- Shimcache Execution Is Back - What You Need to Know!
- Windows Internals Crash Course
- Windows Internals [Red Team Training] -- TryHackMe LIVE!
- [#E03] Secure Code Review for Beginners: Path Traversal
- Malware Development - Creating a Custom C2 Agent Part 2
- cowbe0x004 starred binsider
- cowbe0x004 starred GhostStrike
- cowbe0x004 starred threat-tools
- cowbe0x004 starred openbas
- cowbe0x004 starred traceeshark
- cowbe0x004 starred NamedPipeMaster
- cowbe0x004 starred TRACE-Forensic-Toolkit
- cowbe0x004 starred USP
- cowbe0x004 starred Invisi-Shell
- cowbe0x004 starred VeilTransfer
- RT Devansh (⚡, 🥷): If you, like many, think relying just on
cat
command's output is enough to be sure about the integrity of a bash file. Think ... - RT Alh4zr3d: Red Teamers: Windows Subsystem for Linux (WSL) is more and more common, especially on dev workstations. Don't neglect it! WSL rev shell: ...
- RT Grzegorz Tworek: Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautif...
- RT Mr. Rc: Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources tha...
- RT Oliver Lyak: Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential G...