b33f

@FuzzySec

意志 / TeamRed / Windows Pwn & Undocumented & Breakout & Priv Esc / Wandering edge case / PowerShell / Caffeine Junkie / Tempora mutantur, nos et mutamur in illis

patreon.com/FuzzySec
Joined April 2012

Tweets

You blocked @FuzzySec

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @FuzzySec

  1. Pinned Tweet
    Dec 12

    I will be delivering a two day training at HIP18 => Windows Post-Exploitation: Subverting The Core 🔫💣🔪

  2. Retweeted
    Dec 20

    SQL Injection Cheat Sheet

  3. Retweeted
    Dec 19

    Just published my paper on largely undocumented / campaigns targeting cryptocurrency individuals/orgs (both big and small). The research covers new implants/tactics not currently covered in the media regarding 'fake jobs' campaigns.

    Show this thread
  4. Retweeted
    Dec 19

    Just found this resource on game hacking by , great work!

  5. Retweeted
    Dec 19

    [blog/tool] InsecurePowerShell - PowerShell Without .Automation.dll I promise that one day I will blog about something other than PowerShell... but today is not that day 🙂

  6. Retweeted
    Dec 11

    A long overdue publication of 's deep look at a credit card skimmer was given from Old Street, Shoreditch, London

  7. Retweeted
    Dec 18

    Oh Wow, this was a blast to write. In Memory SSL Intercept ;-). Thanks again mavinject! All your Encrypted PowerShell WebRequests Are Belong To Us ;-) Have Fun!

    Show this thread
  8. Retweeted
    Dec 18

    Email attached ZIP contains .BAT that uses UTF-16 BOM to "obfuscate" batch script commands. Installs .VBS Startup Dir and delivers PShellExecRuns that runs encrypted code to inject DLLs.

  9. Retweeted
    Dec 18

    aPAColypse now: Exploiting Windows 10 in a Local Network with WPAD/PAC and JScript

  10. Retweeted
    Dec 17

    Embed payloads in the pixels of images and generate oneliners to execute with Invoke-PSImage: Is it a kiwi or is it ?

  11. Retweeted
    Dec 16

    Excited to play with 's Detection Lab this weekend. I'll probably write up a short blog on setting it up and using it.

  12. Dec 17

    I uploaded a highlight of my Patreon () session where I previewed NeonTwilight scheduled for release in January -

  13. Retweeted
    Dec 15

    Making something out of Zeros: Alternative primitive for Windows Kernel Exploitation

  14. Retweeted
    Dec 15

    I created a new Windows 10 VM with a pristine image from MSDN, and noticed a third party password manager is now installed by default. It didn't take long to find a critical vulnerability.

    Show this thread
  15. Retweeted
    Dec 14

    Using MavInject32.exe (Microsoft Corp Signed) to load any dll in a running process. > "C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe" <PID> /INJECTRUNNING <PATH DLL> cc:

    Show this thread
  16. Retweeted
    Dec 13

    Thoughts about "Process Doppelganging" and proof-of-concepts,

  17. Retweeted
    Dec 11
    Show this thread
  18. Retweeted
    Dec 11

    Learn how our red team developed an exploit (memory corruption in MS Word) for CVE-2017-11826 //cc

  19. Retweeted
    Dec 10

    Code Execution via Insecure Lenovo Objects

  20. Dec 10

    The 7th () live session will be on the 15th of Dec, I will be previewing NeonTwilight an end-to-end C2 framework ⚔️ Countdown =>

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·