eleven red pandas

45.2K posts

eleven red pandas banner
eleven red pandas

eleven red pandas

@bytecodevm

Hey @bytecodevm (eleven red pandas 🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼), got any spicy bytecode / VM / language implementation / JIT / music

Bagnes, Switzerland 가입일 Kasım 2010
818 팔로잉1.8K 팔로워
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces BYOUD, a Windows evasion technique that manipulates unwind metadata to spoof call stacks without altering return addresses, allowing malware to bypass EDR stack inspection and appear as legitimate execution. core-jmp.org/2026/03/invisi…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
1
1
44
eleven red pandas 리트윗함
Hermes Tool
Hermes Tool@Hermes_tooll·
tool that bypasses iOS SSL Pinning using OpenVPN + iptables — works with Burp Suite & mitmproxy out of the box. 👇 GitHub github.com/SahilH4ck4you/…
English
1
15
113
6.3K
eleven red pandas
eleven red pandas@bytecodevm·
The article explains Microsoft’s ODR mechanism for native MCP registration, enabling AI agents to discover and invoke system tools through the Model Context Protocol, preparing Windows for secure agent-driven workflows and integrations. core-jmp.org/2026/03/odr-in…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
4
101
eleven red pandas 리트윗함
VLadimiR
VLadimiR@Dz10Chiheb·
CVE-2026-25769 - Remote Code Execution via Insecure Deserialization in Wazuh Cluster github.com/hakaioffsec/CV…
Română
0
29
114
8.5K
eleven red pandas
eleven red pandas@bytecodevm·
The article demonstrates how to bypass the Winsock layer by communicating directly with the Windows AFD driver using Native API calls. It explains how socket operations can be replicated via IOCTLs and how this reduces reliance on standard networking APIs. core-jmp.org/2026/03/nt-afd…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
14
40
1.5K
eleven red pandas
eleven red pandas@bytecodevm·
CVE-2025-41245 / CVE-2026-22721 VMware Aria Operations that enable credential disclosure and privilege escalation. Attackers with limited access can escalate privileges and gain administrative control over the infrastructure monitoring platform. core-jmp.org/2026/03/vulner…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
0
226
eleven red pandas
eleven red pandas@bytecodevm·
The article analyzes the Windows GetProcessHandleFromHwnd API and its evolution from a hook-based implementation to a kernel Win32k function that could open powerful process handles, enabling security bypasses such as CVE-2023-41772. core-jmp.org/2026/03/a-deep…
eleven red pandas tweet media
English
0
0
3
152
eleven red pandas 리트윗함
Dimitri Fourny
Dimitri Fourny@DimitriFourny·
From virtio-snd 0-Day to Hypervisor Escape: Exploiting QEMU with an Uncontrolled Heap Overflow - osec.io/blog/2026-03-1…
English
0
7
35
1.6K
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces Windows kernel exploitation and explains how to build a research lab using tools like WinDbg and the HackSys Extreme Vulnerable Driver (HEVD) to study kernel vulnerabilities and exploit development. core-jmp.org/2026/03/0x00-i…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
5
192
eleven red pandas
eleven red pandas@bytecodevm·
The article demonstrates how to hook COM methods in Windows Subsystem for Linux by leveraging C++ RTTI metadata to reconstruct class layouts and locate virtual methods, enabling precise COM instrumentation without symbols. core-jmp.org/2026/03/wsl-co…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
7
23
1.6K
eleven red pandas 리트윗함
blackorbird
blackorbird@blackorbird·
Extract Windows credentials directly from VM memory snapshots and virtual disks github.com/nikaiw/VMkatz
blackorbird tweet mediablackorbird tweet media
English
0
13
46
3.8K
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces LOLExfil, a Living-Off-the-Land data exfiltration technique that abuses legitimate system tools and trusted services to stealthily extract data, blending malicious activity with normal system behavior. core-jmp.org/2026/03/lolexf…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
4
195
eleven red pandas
eleven red pandas@bytecodevm·
The research reverse-engineers the TP-Link Tapo C260 camera firmware and analyzes Tapo Discovery Protocol v2. By dumping and decrypting the filesystem, the author reconstructs protocol logic and maps the device’s network attack surface. core-jmp.org/2026/03/revers…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
1
0
4
168
eleven red pandas
eleven red pandas@bytecodevm·
Research shows how Palo Alto Cortex XDR predefined BIOC behavioral rules can be decrypted and analyzed. By understanding rule logic and built-in exceptions, attackers can adapt techniques to evade detection and bypass behavioral protections. core-jmp.org/2026/03/decryp…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
53
162
13.4K