Niemand  

@niemand_sec

Security Consultant at . I'm a system engineer, who loves security. Opinions are my own

Argentina
Joined May 2016

Tweets

You blocked @niemand_sec

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @niemand_sec

  1. Pinned Tweet
    3 Jul 2019

    "AntiCheat-Testing-Framework" is all the code developed during my research for I hope it will help people understand how Anti-Cheats work, and let them dive into this amazing topic. Feel free to collaborate.

    Undo
  2. Retweeted
    Jan 30

    is proud to announce offensive security expert Marco Ivaldi () will be presenting: The INFILTRATE Effect: 6 Bugs in 6 Months — Don't miss out. REGISTER TODAY!

    Undo
  3. Jan 31

    Reversing XignCode3 Anticheat – Registering Notify and Callback Routines Part 4.1 is out! 🤯 Anti-cheats use callbacks and notification routines to control what is happening on your system, let's dig into this

    Undo
  4. Jan 30

    Interesting graph if you are playing to do any sort of certification :)

    Undo
  5. Retweeted
    Jan 26
    Undo
  6. Retweeted
    Jan 24

    Ever get a pointer to the middle of a struct? Just add the __shifted keyword to the variable's type definition!

    Undo
  7. Jan 24

    Reversing XignCode3 Anticheat - Part 3 is now out! 🥳 Understanding dispatcher functions is fundamental for reversing Windows drivers. Let's see how this Anti-cheat dispatch the IRP requests.

    Undo
  8. Jan 24
    Undo
  9. Jan 23

    I have used this tool before and it does what it says it does! If you are trying to dump a process that has usermode protections this could be a great option. For kernel protection, you will need to use a different technique to load the unsigned driver :)

    Undo
  10. Jan 22
    Show this thread
    Undo
  11. Jan 22

    your opinion is required :P

    Show this thread
    Undo
  12. Jan 22

    🔥🔥 Trending topic at the office today. Fanny pack, yes or no? Riñonera, si o no? Discusión acalorada en la offi. 🔥🔥

    Show this thread
    Undo
  13. Retweeted
    Jan 22

    Because Hardware and Photography can be enjoy together.

    Undo
  14. Jan 21
    Undo
  15. Jan 21

    Sometimes people think about this only when doing bug bounties, but it can be really useful when doing recon during a pentest. A single list with a miss-configuration like that could provide you the access level you need to trigger a better attack vector.

    Undo
  16. Jan 21

    What I like the most about these bugs it's not just finding them but also to figure out the side effects it may have on the game. Nice video :)

    Undo
  17. Retweeted
    Jan 20

    When doing some Hardware Hacking sometimes you can’t or prefer to avoid soldering stuff to the PCB. Using Hot Glue Gun and the proper angle could do the trick.

    Show this thread
    Undo
  18. Retweeted
    Jan 18

    I'm putting together a list of resources for learning about PE file format and Windows Loader, can you recommend me the best resources to add to this guide?

    Undo
  19. Retweeted
    Jan 16

    My favorite articles are the ones that walks you through the author methodology and strategy to find/exploit bugs. This is the case for last post on Chrome IPC vulnerabilities:

    Undo
  20. Retweeted
    Jan 15

    Part 2 of our PicoCTF tutorial

    Undo
  21. Jan 16

    Reversing XignCode3 Driver – Part 2 – Analyzing init functions Part 2 is online! Understand how the Anticheat Driver inits some custom structures and variables that are later used to dispatch the different IOCTLs.

    Undo

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·