GKarAnThe0nly1

1.1K posts

GKarAnThe0nly1 banner
GKarAnThe0nly1

GKarAnThe0nly1

@GeKarantzas

George Karantzas. - Est. 2001. - BSc Student@UniPi. - Opinions are my own.

Earth - Dimension C137 Katılım Şubat 2020
2.2K Takip Edilen1.9K Takipçiler
GKarAnThe0nly1 retweetledi
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Also improved my Novel Process Injection technique, it's still failing depending on which opened handles were found. But the evasion rates are great. Let me know your feedback and possible improvements github.com/S12cybersecuri…
English
2
22
102
3.5K
GKarAnThe0nly1 retweetledi
Wakedxy
Wakedxy@Wakedxy1·
During your pentest mission, please don’t make the same mistake I did. Add printer IPs to your exclusion list when running Nuclei. Otherwise, the printer will interpret every packet sent to port 9100 as a print job.
English
59
143
2.4K
82.1K
GKarAnThe0nly1 retweetledi
Wietze
Wietze@Wietze·
Can LNK files ever be trusted? ⚡ My latest blog post demonstrates several new LNK abuse methods, allowing you to fully spoof the target shown in Explorer. It also introduces tools to create your own LNKs, and detected spoofed ones yourself. 🐬 wietzebeukema.nl/blog/trust-me-…
English
12
202
943
137.1K
GKarAnThe0nly1 retweetledi
Petr Beneš
Petr Beneš@PetrBenes·
Ever wanted to draw a triangle with OpenGL as a 2kb position-independent shellcode? No? Me neither. But you can do it anyway: github.com/wbenny/scfw
English
0
31
148
10.2K
GKarAnThe0nly1
GKarAnThe0nly1@GeKarantzas·
If you have any good public discord server with audience to suggest on WindowsOS Dev , Mobile OS Android/iOS Dev & internals, SDR/Baseband/Sigint dev & internals, Embedded Development, RTOS, Architecture, Telco etc lmk always looking to stay up to date with the newest events.
English
0
0
0
167
GKarAnThe0nly1 retweetledi
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
WhatsApp End-to-End Encryption vs. Forensic Extraction Although WhatsApp uses end-to-end encryption to protect messages, calls, and shared media during transmission, this protection only applies while the data is moving between devices. Once the content reaches the device, it is stored unencrypted within WhatsApp’s local databases and media folders. Out of the volumes of content, such as 733,543 WhatsApp messages, along with videos, audios, images, and documents. I was able to get a conversation between my kid sister @ama_Anyemedu in November 11, 2020. The chat preview shows a typical WhatsApp conversation recovered from a mobile forensic extraction. At the top of the chat, WhatsApp displays the standard banner “Messages are now secured with end-to-end encryption.” This banner simply means that when messages are being transmitted between two devices, WhatsApp’s servers cannot read them because they are protected by encryption keys stored only on the users’ devices. However, end-to-end encryption does NOT protect data stored on the device itself. Mobile forensics work by accessing the phone’s internal storage, not by intercepting messages from WhatsApp servers. Once a device is unlocked or decrypted by the lawful extraction process, the tool can read the local WhatsApp databases stored on the device (usually the `msgstore.db` and related SQLite databases). This is why, despite the presence of the "end-to-end encryption" banner, the forensic tool is still able to extract: * Full chat history * Timestamps * Participants * Message contents * Attachments * Deleted messages (if still recoverable in the database) End-to-end encryption protects data in transit, not data *at rest* on the device. Forensic tools exploit lawful access to the device’s decrypted file system, enabling them to parse and display the stored WhatsApp database, which is why you can see the complete message timeline, content, and timestamps on the right side.
Nana Sei Anyemedu tweet mediaNana Sei Anyemedu tweet media
English
104
621
2.6K
301.1K
GKarAnThe0nly1 retweetledi
Matt Ehrnschwender
Matt Ehrnschwender@M_alphaaa·
I made a CTF challenge a couple years ago which required decrypting Ekko sleep obfuscation from a memory dump. It had ~5 solves by the end of the CTF. Here's a writeup on it elvisblue.github.io/posts/nahamcon…
𝙁 𝙀 𝙇 𝙄 𝙓 𝙈@felixm_pw

With some guidance from @DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation 💤 blog.felixm.pw/rude_awakening…

English
2
27
142
11.5K
GKarAnThe0nly1 retweetledi
Catalyst Security
Catalyst Security@catalystsec·
We're excited to announce the formation of Catalyst Security! We're a new company started by a small group of experienced vulnerability researchers, focused solely on innovative research. catalystsecurity.com
English
1
14
86
42K
GKarAnThe0nly1 retweetledi
Check Point Research
Check Point Research@_CPResearch_·
Thread Execution Hijacking is one of the well-known methods that can be used to run implanted code. In this blog we introduce a new injection method, that is based on this classic technique, but much stealthier - Waiting Thread Hijacking. Read More : research.checkpoint.com/2025/waiting-t…
English
2
109
266
100.1K
GKarAnThe0nly1 retweetledi
Archie
Archie@Archie_1997·
ETW is an incredibly powerful tool in the wrong hands. Just finished writing about how it allows drivers to hook context switches on Windows 11 24H2 while remaining PatchGuard and HVCI compatible: archie-osu.github.io/etw/hooking/20…
English
5
73
239
15.8K
GKarAnThe0nly1 retweetledi
Archie
Archie@Archie_1997·
Getting code execution in a process that cannot be located using traditional kernel APIs and is untouchable from usermode? All while staying PatchGuard-friendly? Sign me up: archie-osu.github.io/2025/04/13/pow…
English
4
87
427
26.3K
GKarAnThe0nly1 retweetledi
Archie
Archie@Archie_1997·
Dug into @RiotVanguard's kernel driver's dispatch table hooks. The article took an unexpected turn half way through, as I found some not yet documented stuff, such as the complete list of system calls hooked by the driver. Article link: archie-osu.github.io/2025/04/11/van…
English
1
56
175
11.8K