I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
VLANs protect you as much, if not *moreso* than traditional antivirus, yet I barely know 2 people IRL that use them.
IoT garbage? VLAN
Work PC? VLAN
Gaming Console? VLAN
Who cares if something is compromised if it can't talk to anything useful.
CVE-2025-52915 assigned - my first vulnerability!🥳
A classic BYOVD case: kernel driver with unrestricted process termination.
Vendor coordination turned out more challenging than the exploit itself.
Technical write-up: blacksnufkin.github.io/posts/BYOVD-CV…#ExploitDev#CVE#BYOVD#RedTeam
My timeline is full of 𝗶𝗢𝗦 𝟬-𝗰𝗹𝗶𝗰𝗸 𝗲𝘅𝗽𝗹𝗼𝗶𝘁 again. If you’re new to these bugs, check out my write-up on my own fuzzing experience with 𝗜𝗺𝗮𝗴𝗲𝗜𝗢 from last year.
r00tkitsmm.github.io/fuzzing/2024/0…
I know a lot of people will hate me for saying this but it has to be said. I get a lot of DMs saying RT is getting harder everyday, traditional loaders dont work anymore, opensource tools tend to crash or get detected instantly. But wasnt that the whole point of Red team? Thats…
I've been asked countless times how to learn VR & xdev. The answer is always: "do something you think is cool". It's hard to figure out what to do. Try the PhrackCTF which I've now open-sourced. It's not a contrived CTF - modeled after real vulnerabilities github.com/xforcered/Phra…
As a little follow up, I wrote a small blog post/tutorial on how to reverse engineer windows drivers with IDA - this is aimed at people that newer touched drivers before and covers IOCTL codes, IRPs and some IDA shenanigans with unions.
eversinc33.com/posts/driver-r…
Enjoy :3
It's high time I shared the final post in my buffer overflow series! We finally bypass ASLR and I also include a video walkthrough stepping through the debugging process. Thanks for taking the journey with me throughout this series 😀
g3tsyst3m.github.io/binary%20explo…
I remember that I had to do some research online on how to make exploits for vulnerabilities over MS-RPC. With this blog, I hope to fill the gap on the lacking information available online on how to make these yourself.
incendium.rocks/posts/Exploit-…
I hacked an Optical Network Terminal (ONT)! This one was slightly more hardened than the usual ones, but thankfully hardware hacking expands your toolbox... spaceraccoon.dev/getting-shell-…
Black Mass Volume III is on it's final stages of development. Our publisher has received it. If they don't yell at us and be mean, Black Mass Volume III will become available Friday, July 25th, 2025.
It will be available online as a PDF for free. You can buy a physical copy for…
Part 4 of the Buffer Overflow series has been posted! In today's writeup, we learn how to create a decoder stub, introduce an obligatory nop sled, and use memcpy to copy the encoded shellcode to our newly created memory region using VirtualAlloc 😺
g3tsyst3m.github.io/binary%20explo…
Dear Red Team nerds,
If you're curious what a successful and serious malware campaign looks like (if you want to make a more serious Red Team engagement) I HIGHLY suggest reading the write up on the new malware campaign called TransferLoader
zscaler.com/blogs/security…
Here's Part 2 of the Buffer Overflows in Modern Era series. In this post, we'll perform the actual buffer overflow using Python, learn how ROP works + DEP restrictions, and once again execute the obligatory Windows calculator 😸
g3tsyst3m.github.io/binary%20explo…
946 Followers 94 FollowingCybersecurity meets metal. Shirts for fictional bands named after malware and threat actors. Literal malwear. DM for international orders. Requests are welcome.
1K Followers 1 FollowingThis is the X page for the Off By One Security YouTube channel and Discord server. Streams every Friday at 11AM PT. https://t.co/Q8qt342Nhx
11K Followers 729 Following// unethical hacker
// cybersecurity leader: megacorp, usa
// ex big tech, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
9K Followers 334 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
8K Followers 399 FollowingWindows Internals enthusiast, Interested in hardware design & low-level programming. An active developer of @HyperDbg debugger.
https://t.co/TUALkTusHt
417 Followers 11 FollowingLearn cybersecurity for free with courses, machines, CTF challenges, and access to archived tests of past CTFs (Jeopardy format).
1K Followers 120 FollowingResearcher and appsec trainer. Building different security-related stuff at https://t.co/vdti8NnFhw.
https://t.co/vhi619Xccj and https://t.co/x2ir2F66Fr
1K Followers 125 FollowingSecurity Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.
8K Followers 151 FollowingFor contact in the security community. NOTE: All the tweets are totally my personal opinions, not about any of my current employer stuff.
9K Followers 17 Following501(c)3 Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021! [email protected]
5K Followers 47 FollowingWe secure software with deep-dive audits, cutting-edge research, and in-depth trainings.
Secure your solana program with Riverguard @ https://t.co/VmxVHzx2U2 🏞️💂
49K Followers 339 FollowingSecurity researcher in Google Project Zero. Author of Attacking Network Protocols. Tweets are my own etc. Mastodon: @[email protected]
7K Followers 872 FollowingCEO, RemoteThreat, Head of Red team @ IBM X-Force, Black Hat Review Board. Founder and co-organizer of Offensive AI Con. inveni et usurpa