Opens profile photo
Follow
Will Schroeder
@harmj0y
Researcher . Coding towards chaotic good while living on the decision boundary. #dontbanequality
Seattle, WAblog.harmj0y.netJoined August 2012

Will Schroeder’s Tweets

detecting EDR services remotely without admin privs. indicators: - installed services: [MS-LSAT] LsarLookupNames() - running processes: named pipes (there are some characteristic to EDRs) needs some more testing and cleanup before release, but looks like promising.
Image
23
741
Show this thread
This looks like an incredible piece of work, can't wait to try it out!
Quote Tweet
I’m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exe’s in Beacon memory without dropping to disk or creating a new process each time. github.com/Octoberfest7/I #redteam #cybersecurity #malware
1
18
A great overview of what Windows Services are, how they work, and what weaknesses or abilities they can provide attackers
Quote Tweet
Today @v3r5ace and I are releasing the 2nd installment of The Defender's Guide! In this blog we walk through Windows Services! Medium Link: posts.specterops.io/the-defenders- Github Link: github.com/Defenders-Guid
1
116
Show this thread
[RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, result of a joint research on an original technique developed by namazso, done with my friends and . Enjoy! ;)
12
469
Show this thread