sh4hin

414 posts

sh4hin banner
sh4hin

sh4hin

@s3cdev

Threat Emulation/Hunting | Linux/Mac enthusiast

Se unió Eylül 2012
4.5K Siguiendo972 Seguidores
vx-underground
vx-underground@vxunderground·
Giveaway. Thank you @mrd0x for sponsoring this. We've got FIVE @MalDevAcademy vouchers. These vouchers are bundles. This vouchers give you: - Full access to malware source code database - Full access to malware development course Comment below for a chance to win.
English
916
64
738
49K
SCADA_PLC
SCADA_PLC@scada_plc·
🔥SCADA is changing fast. When LLMs meet WinCC OA, the system doesn’t just show data — it actually understands it. A pump trips? Instead of digging through trends and alarms, the AI explains the root cause like a senior engineer sitting beside you. Voice commands. Smart diagnostics. Actionable recommendations. All inside the SCADA layer — no PLC changes needed. This is the future of automation. And it has already begun. ⚡🤖 #SCADA #WinCCOA #LLM #ProcessAutomation #OT #IIoT
SCADA_PLC tweet media
English
1
0
4
73
sh4hin
sh4hin@s3cdev·
@0xcc00 Thanks for the great work on this PoC. I’m facing an issue ,the command output isn’t showing in the Gemini console, and it can’t detect live beacons. Not sure if I’m missing something. Happy to continue here or via DM
English
1
0
0
91
Bilal
Bilal@0xcc00·
@s3cdev Hey, what is it ?
English
1
0
0
108
Bilal
Bilal@0xcc00·
I've been playing with MCP, Releasing AdaptixC2_mcp a PoC that exposes Adaptix-C2 APIs to gemini-cli, enabling it to control a beacon and to simulate a threat actor behavior. Code: github.com/0xb11a1/Adapti…
English
1
2
19
1.2K
Arcanum Information Security
Arcanum Information Security@arcanuminfosec·
🌟GIVEAWAY ALERT🌟 We are giving away 4 seats to our training: "Red Blue Purple AI" - July 15 & 17 Comment below and follow us and you will be entered to win a seat in this course valued at $2,000. Winners will be announced Friday! arcanum-sec.com/training/red-b…
Arcanum Information Security tweet media
English
88
17
84
5.5K
sh4hin
sh4hin@s3cdev·
@djnn1337 Thanks, it was while back and the codes should be rewritten 😁
English
0
0
2
34
Alice Climent
Alice Climent@AliceCliment·
Finally done! My latest article introduce the basics of Windows kernel drivers/internals and how to find and exploit process killer drivers using LOLDrivers 🤓 I hope you'll enjoy it! alice.climent-pommeret.red/posts/process-…
English
17
216
509
77.5K
sh4hin retuiteado
Matt Zorich
Matt Zorich@reprise_99·
In nearly all of our on-premises engagements, a threat actor has taken total full control of Active Directory. If you are interested in the kind of things @MicrosoftDART finds, and how we recommend you secure Active Directory, then this blog is for you - techcommunity.microsoft.com/t5/microsoft-s…
English
10
213
581
73.1K
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
How would you name your malware so that the level 1 analyst waves it through? I'll start - eicar.exe - keygen.exe - Bloomberg_Excel_Addon.exe - SAP-custom-helper.exe - \SecurityTraining_Oct22\something.exe - \quarantine\inactive-sample-af232.exe
English
195
113
878
0
sh4hin retuiteado
Matthew
Matthew@embee_research·
Reverse Engineering a #CobaltStrike #malware sample and extracting C2's using three different methods. We'll touch on #cyberchef, #x64dbg and Speakeasy from fireeye to perform manual analysis and emulation of #shellcode. A (big) thread ⬇️⬇️ [1/23]
Matthew tweet mediaMatthew tweet mediaMatthew tweet media
English
17
366
1.1K
0
sh4hin retuiteado
diversenok
diversenok@diversenok_zero·
I'm happy to share the results of months of research on code injection, process tampering, and their detection! 🥳 Here you'll find technique categorization, a dive into the underlying OS mechanisms, sample demos, detection suggestions, and much more: huntandhackett.com/blog/concealed…
English
10
124
293
0
Anton
Anton@Antonlovesdnb·
I’m taking a week off to catch my breath and am super excited to be joining the Threat Research team at @SumoLogic - I’m really looking forward to contributing more to the community that has given me so much. 🎉🎉
English
22
0
43
0
Anton
Anton@Antonlovesdnb·
Last week was my last at Lares. Huge thank you to @indi303 @NotMedic @infosecmafia @J3ssa and the rest of the amazingly talented and wonderful team. Another massive thank you to all the awesome clients that have allowed me to work with them over the years 💙
English
6
0
45
0
sh4hin retuiteado
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
NimGetSyscallStub is now public, the first public fully working (didn't find another myself) Nim imlementation + PoC to grab fresh Syscalls from disk on runtime: github.com/S3cur3Th1sSh1t… @chvancooten even with a yara rule (with your template 🤓)
S3cur3Th1sSh1t tweet mediaS3cur3Th1sSh1t tweet media
English
5
93
236
0