memN0ps

@memN0ps

Security Researcher

New Zealand
Vrijeme pridruživanja: listopad 2018.

Tweetovi

Blokirali ste korisnika/cu @memN0ps

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @memN0ps

  1. Prikvačeni tweet
    13. ruj 2019.

    HTTP Request Sumuggling CL.TE I submitted this on Synack it was my very first smuggling bug. Special thanks to My blog is not perfect but it’s a start, hope this helps my fellow hacker community.

    Poništi
  2. proslijedio/la je Tweet
    1. velj

    The team is working through submissions for the first round of 2020 hiring for junior and senior roles. Be quick to get in there if you’re new to the industry or just looking for a change from the norm.

    Poništi
  3. proslijedio/la je Tweet
    3. pro 2019.

    The next round of roach hiring will occur early 2020. Several roles across all levels, so get in touch if hacking all manner of things interests you, and you don't have a fear of cockroaches.

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    HEVD -- Arbitrary Write, Win7 x86 thanks to all the sourced bloggers, content producers, elders

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  6. proslijedio/la je Tweet
    25. sij

    [Blog] Offensive Security - AWE/OSEE Review cc

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    Hackers have been abusing a poor integrity check in BattlEye to completely circumvent game protection mechanisms. This has allowed cheat communities to intercept and modify every single piece information sent by the anti cheat to the respective servers.

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    24. sij

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Poništi
  9. proslijedio/la je Tweet
    23. sij

    I have used this tool before and it does what it says it does! If you are trying to dump a process that has usermode protections this could be a great option. For kernel protection, you will need to use a different technique to load the unsigned driver :)

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet

    Part 8 is up on my blog in the Windows Kernel Exploitation Tutorial Series, Use After Free: Again, huge thanks to for the awesome driver. 👌👌

    Poništi
  12. proslijedio/la je Tweet
    21. sij

    Opensourcing another project from team , Simple and Fast port scanner with handy features to use with another tool in your recon pipeline. Link to project:-

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    22. sij

    progressing through the Hacksys Extreme Vulnerable Driver exploits here: . huge thanks to the sourced authors, feels very silly to write my own blogs on the subject compared to their material/experience,but helps me learn. mb helpful for other noobs like me

    Poništi
  14. proslijedio/la je Tweet
    21. sij

    We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.

    Poništi
  15. proslijedio/la je Tweet
    20. sij
    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    20. sij

    The 7th part of the tutorial Hypervisor From Scratch is published! In this part, I described EPT. Thanks to Petr as Hypervisor From Scratch could never have existed without his help and to Alex for patiently answering my questions.

    Poništi
  17. proslijedio/la je Tweet
    9. pro 2019.

    I decided to create a tutorial called "Reversing Windows Internals" and explain about Windows Internals. The first part describes about Handles, Callbacks and Hidden Callbacks and ObjectTypes in Windows Thanks to for answering my questions.

    Poništi
  18. proslijedio/la je Tweet
    19. sij

    A great Windows 10 heap grooming and exploitation blog post by in case you missed it last year:

    Poništi
  19. proslijedio/la je Tweet
    20. sij

    It's here!!! Tell your colleagues, tell your friends, tell your grandma.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    3. sij
    Poništi
  21. proslijedio/la je Tweet
    19. pro 2019.

    Ashfaq Ansari (), a security researcher will conduct training at - Windows Kernel Exploitation. Learn basics of windows & driver internals, different memory corruption classes & fuzzing of kernel-mode drivers. More ➡️

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·