Shashwat Shah 🇮🇳

241 posts

Shashwat Shah 🇮🇳 banner
Shashwat Shah 🇮🇳

Shashwat Shah 🇮🇳

@0xEr3bus

CRT(O|E|M|L) | CAPE | Content Engineer @ HackTheBox | Windows Exploitation | Wannabe Red Teamer

United Kingdom Katılım Temmuz 2021
92 Takip Edilen640 Takipçiler
Shashwat Shah 🇮🇳 retweetledi
Bobby Cooke
Bobby Cooke@0xBoku·
As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki
English
27
235
701
568.7K
Shashwat Shah 🇮🇳 retweetledi
Dylan Tran
Dylan Tran@d_tranman·
Had a lot of fun digging into COM stuff with @bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…
English
12
177
527
76.4K
Shashwat Shah 🇮🇳 retweetledi
Hack The Box
Hack The Box@hackthebox_eu·
Big brother is watching you 👁️ A new #HTB Seasons Machine is coming up! DarkCorp created by 0xEr3bus will go live on 8 February 2025 at 19:00 UTC. MagicGardens will be retired! ✓ Insane ✓ Windows → Join the competition & start #hacking: okt.to/5DzSPb
Hack The Box tweet media
English
2
6
103
5.6K
Shashwat Shah 🇮🇳 retweetledi
Dylan Tran
Dylan Tran@d_tranman·
Need a sanity check on module stomping. I've always thought that it backs the first return address, but the rest of the call stack isn't guaranteed due to our payload making `calls` from the stomped DLL from points of the code which may or may not have a suitable stack size (1/?)
Dylan Tran tweet media
English
3
7
46
7.2K
Shashwat Shah 🇮🇳 retweetledi
Sasha
Sasha@0xA5h·
I'm happy to announce that I've (finally) started a blog: sashactf.gitbook.io/pwn-notes. Check out the first posts about doing ROP on 2.34+ without "pop rdi", and more will be coming soon™ :)
English
2
4
11
1.6K
Cipher007
Cipher007@xCipher007·
I Learnt about API Hashing today!!! It took a while to get it working, but it was a nice learning experience!
Cipher007 tweet media
English
2
0
8
543
icyguider
icyguider@icyguider·
I recently implemented 7 public UAC bypasses as BOFs and integrated them into a Havoc module and Sliver extensions. Requests to add more bypass methods are also welcome! github.com/icyguider/UAC-…
English
9
116
336
25.4K
Dylan Tran
Dylan Tran@d_tranman·
tried to port over the rust clr heap encryption thing to c but failed miserably (skill issue). thought i might as well share: github.com/susMdT/clr-thi… tldr: unmanaged clr -> run assembly -> unload domain + force GC. questionable interface implementation but i can SetHostControl
English
3
2
34
3.2K
David Kennedy
David Kennedy@Cyb3rC3lt·
@0xEr3bus @theluemmel @_0xDeku This is fantastic, I was just thinking I may need this at my test today in case the PoolParty binary is statically detected. Great job.
English
1
0
1
152