Shogun Lab

@shogun_lab

Shogun Lab conducts research to help organizations secure their systems and software. Metasploit Framework contributor. おもしろい です ね。

Vrijeme pridruživanja: ožujak 2017.

Tweetovi

Blokirali ste korisnika/cu @shogun_lab

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @shogun_lab

  1. Prikvačeni tweet
    22. pro 2019.

    The second part of my Ghidra tutorial series for reversing Windows binaries is up! We look at converting data, function call trees/graphs and the script manager. Along the way, we'll solve CrackMe binaries and a Flare-On 6 CTF challenge:

    Poništi
  2. proslijedio/la je Tweet
    10. pro 2019.

    Introducing SysWhispers, a tool that helps with AV/EDR evasion by using direct system calls to bypass user-mode API hooks. It works by generating header/ASM pairs supporting all core syscalls from Windows XP to 10. Check it out here with examples:

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    17. stu 2019.

    Here's an implementation of a persistence technique found in Vault 7 that stores data in NVRAM variables. Data can survive OS re-imaging and cannot be enumerated with OS-level APIs. Requires admin.

    Prikaži ovu nit
    Poništi
  4. 22. kol 2019.

    Thanks to for merging my pull request into Awesome Virtualization! 🎉 You can check out their comprehensive list of virtualization resources here:

    Poništi
  5. 15. kol 2019.

    Began curating a list of Hyper-V exploitation resources, hope it can be of use to anyone interested in starting Hyper-V security research:

    Poništi
  6. proslijedio/la je Tweet
    30. lip 2019.

    System-call decompilation is coming to Ghidra in 9.1! Awesome

    Poništi
  7. 28. lip 2019.

    Took the Windows Internals training by at this week. Highly recommend it to anyone who wants a deep understanding of how Windows operates and obtain the skills necessary to pursue their own Windows security research. Lots of examples/demos given. Thanks Alex!

    Poništi
  8. proslijedio/la je Tweet
    19. tra 2019.
    Poništi
  9. 15. tra 2019.

    If you've been curious about COM exploitation and how it can be used for local privilege escalation on Windows, this post lays out a clear methodology and has practical examples.

    Poništi
  10. 12. tra 2019.

    Excited to finally share a post on the subject of reverse engineering, I'm still learning and any feedback is welcome. Hope it's helpful!

    Prikaži ovu nit
    Poništi
  11. 12. tra 2019.

    Interested in Ghidra or getting started with reverse engineering? I wrote a post about Ghidra's main windows and how it can be used to solve a simple CrackMe. This will be the first in a series on reversing Windows binaries with Ghidra:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    4. tra 2019.

    It's here! Ghidra source code released: This is an ongoing, supported project from . Looking forward to seeing the continued advancements and the innovation that occurs from the release.

    Poništi
  13. proslijedio/la je Tweet
    25. ožu 2019.

    The cat is out of the bag

    Poništi
  14. 20. ožu 2019.

    Some interesting work being done here, I have been struggling to manually write a grammar for fuzzing WebKit JavaScriptCore and this tool looks very promising for JavaScript engine fuzzing. Thanks Saelo for open-sourcing it and sharing your work with the community! 🎉

    Poništi
  15. proslijedio/la je Tweet
    9. ožu 2019.

    Lots of people been asking about that. Do you want to see comments in graph mode? This is how its done:

    Poništi
  16. proslijedio/la je Tweet
    7. ožu 2019.

    You can find courses materials available online here:

    Poništi
  17. proslijedio/la je Tweet
    5. ožu 2019.

    We join Rob Joyce in announcing that is alive! Download your copy: and start reversing!

    Poništi
  18. 10. velj 2019.

    Yet another great tool from . Helpful in gaining an understanding of trends or areas for further security research in the WebKit codebase with nifty visualization.

    Poništi
  19. proslijedio/la je Tweet
    20. kol 2018.

    Working on a handy tool called DIRT to help with driver vulnerability research on Windows. Useful for identifying installed drivers that low-privilege users can interface with and dynamically identifying DispatchDeviceControl functions. Code at: .

    Poništi
  20. 15. kol 2018.

    It's nearly that time again! Can't wait for the challenges this year. 😀

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·