Marcus H. | Archiba 🇱🇰/🇸🇪

1.1K posts

Marcus H. | Archiba 🇱🇰/🇸🇪

Marcus H. | Archiba 🇱🇰/🇸🇪

@Archib4

Break systems ➡️ to build safer ones. Penetrationtester @reversec Founder Enclave Views = mine.

Stockholm, Sverige Katılım Aralık 2011
362 Takip Edilen86 Takipçiler
Dave Kennedy
Dave Kennedy@HackingDave·
Pulling the trigger on ordering 8xh100s for TrustedSec. The inconsistencies on frontier models plus how deep we are going with research is a must. Now I’ll have my own dedicated coding system. Excited ! Maybe I’ll share with @HackingLZ and @cantcomputer ..
English
56
4
260
21K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
incursion
incursion@Incursi0n·
Made a quick BOF to exploit the currently unpatched BlueHammer vulnerability to dump SAM hashes from a low integrity context. github.com/incursi0n/Blue…
English
2
87
296
11.7K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
incursion
incursion@Incursi0n·
Releasing GodPotatoBOF: Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. OPSEC safe alternative to the .NET version. Based on the original GodPotato PoC by BeichenDream. github.com/incursi0n/GodP…
English
1
88
320
17.6K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Silky
Silky@S1lky_1337·
Releasing KslKatz. Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-signed driver. github.com/S1lkys/KslKatz
Silky tweet media
English
5
113
342
18.7K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Rtl Dallas
Rtl Dallas@RtlDallas·
Huginn Project: Project to generate COFF-format shellcode with API for : - Indirect syscall API - Stack Spoofing - Proxied LoadLibraryA calls Great for UDRLs, stage0 and OPSEC-conscious shellcode. github.com/NtDallas/Huginn
Rtl Dallas tweet media
English
0
46
152
7.4K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
SpecterOps
SpecterOps@SpecterOps·
WSL2 is a powerful attacker hideout because it runs as a separate Hyper-V VM, and defenders rarely monitor it. Daniel Mayer explains how attackers pivot into WSL2 and what it took to build tooling that works across WSL2 versions. Read more ⤵️ ghst.ly/45fPUma
English
9
173
727
103.7K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Mr.Un1k0d3r
Mr.Un1k0d3r@MrUn1k0d3r·
You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method. github.com/Mr-Un1k0d3r/Do…
English
2
94
334
21.8K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
ChrisPy
ChrisPy@chrispy_sec·
Dropped a follow up blog for the talk I did at fwd:cloudsec earlier in the year. Hopefully this makes it easier for people to follow at their own pace about the SharePoint pre-authentication "feature"/issue and orgs can decide to turn it off or not labs.reversec.com/posts/2025/09/…
English
1
9
21
1.3K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Best Citrix Breakout ever. You can only download .ica files that provide access to certain local applications but breakout out of these applications is not possible? Just modify the .ica file before starting it and remove The InitialProgram= value -> Full Citrix Session! 🤓
S3cur3Th1sSh1t tweet media
English
10
84
387
33.8K
d3d aka dead (dead, мёртв, 死了)
Today I join @Akamai as a Senior Security Researcher and I am very excited to keep pushing the boundaries of both offensive and defense research to help make the internet a little harder for the bad guys to break. 🔥🥲😜
English
47
8
378
20.2K
Octoberfest7
Octoberfest7@Octoberfest73·
What are the attitudes around / is there precedent for presenting a topic/tooling at a convention and then releasing it behind a paywall? I haven't hit a public conference before so not sure if that is something that flies or not.
English
9
0
9
3.1K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Bobby Cooke
Bobby Cooke@0xBoku·
🔪Open-sourcing 💀StringReaper BOF! I've had great success in engagements carving credentials out of remote process memory with this BOF github.com/boku7/StringRe…
English
7
91
297
22.6K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
x86matthew
x86matthew@x86matthew·
I created a hypervisor-based emulator for Windows x64 binaries. This project uses Windows Hypervisor Platform to build a virtualized user-mode environment, allowing syscalls and memory accesses to be logged or intercepted. elastic.co/security-labs/… Project: github.com/x86matthew/Win…
English
29
346
1.3K
112.7K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Rad
Rad@rad9800·
Wrote a short blog post on: - ETW Threat Intelligence generated by SetThreadContext (hardware breakpoints) - Kernel debugging and reversing - Setting HWBPs in a more "stealthy" manner (not the same ETW TI events generated - no detections) Check it out praetorian.com/blog/etw-threa…
English
8
76
250
17.3K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Synacktiv
Synacktiv@Synacktiv·
A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in SCCM/ConfigMgr leading to remote code execution, discovered by @kalimer0x00. synacktiv.com/advisories/mic…
English
1
64
170
11.4K
Marcus H. | Archiba 🇱🇰/🇸🇪 retweetledi
Adam Chester 🏴‍☠️
Achievement unlocked, my first blog with SoecterOps 🤗 This post looks at ADFS OAuth2 support, Device Registration, Enterprise PRT, and a brain dump of things that I didn’t want to leave sat on Notion. posts.specterops.io/adfs-living-in…
Adam Chester 🏴‍☠️ tweet media
English
21
119
348
40.1K