HolyM

1.2K posts

HolyM

HolyM

@HolyMoly84103

Katılım Ekim 2020
425 Takip Edilen17 Takipçiler
HolyM retweetledi
Mr.Z
Mr.Z@zux0x3a·
github.com/Thoxy67/zig-pe Reflective PE loader written in Zig. Loads and executes native and .NET PE files directly from memory. by @Thoxy67
English
0
23
77
3.4K
HolyM retweetledi
bfho
bfho@0xbfho·
boh starred KingOfTheNOPs/CDP-Enable-BOF on Github ift.tt/13CkaRj
English
0
2
9
259
HolyM retweetledi
Vivek | Cybersecurity
Vivek | Cybersecurity@VivekIntel·
NetSonar: Lightweight Network Recon & Diagnostics Toolkit for Blue/Red Teams. 🌐⚡ Multi-protocol probing (ICMP/TCP/UDP/HTTP), subnet discovery, port/service detection, and real-time interface monitoring — all in one cross-platform tool. Useful for network reconnaissance, troubleshooting, and visibility across internal infrastructure. 👉 github.com/sn4k3/NetSonar #CyberSecurity #Networking #OSINT #BlueTeam #RedTeam
English
0
5
31
1.7K
HolyM retweetledi
bfho
bfho@0xbfho·
boh starred ANYLNK/KSLDBYOVDARK on Github ift.tt/FKQpCnw
0
3
9
499
HolyM retweetledi
SoyITPro
SoyITPro@SoyITPro·
Les comparto el paso a paso para crear certificados autofirmados con #PowerShell y firmar los archivos RDP en #Windows11 para que no aparezca la admvertencia al ejecutarlos. Puedes desplegar los certificados por GPOs y la huella para que el editor sea válido para rdp. github.com/SoyITPro/docs/…
Español
1
46
182
8.7K
HolyM retweetledi
kernullist
kernullist@kernullist·
Just shipped a WinDbg x64 extension that turns live disassembly into verified pseudocode via LLM — chunked multi-pass analysis, in-process HTTP, mock fallback, and a verification pass that cross-checks LLM output against original analysis facts. github.com/kernullist/win…
kernullist tweet media
English
3
83
378
24.2K
HolyM retweetledi
winterknife 🌻
winterknife 🌻@_winterknife_·
Added a minimal working PoC for the code injection technique used by the UTILITYBURST implant. github.com/winterknife/EV… P.S. If you think this is kinda lame in 2026, I agree. Remember that Barnaby Jack demonstrated this more than 20 years ago now, and it is still relevant today.
winterknife 🌻 tweet media
English
1
34
100
6.6K
HolyM
HolyM@HolyMoly84103·
@psycep_ Thank you, will be more testing and feedback 😆
English
0
0
1
15
Jacob Paullus
Jacob Paullus@psycep_·
@HolyMoly84103 gopacket's WMI only implements GetObject and ExecMethod, the PutInstance marshalling path from that Impacket issue isn't there. wmipersist calls PutInstance via go-msrpc, and after review, it correctly emits the CIM_FLAG_ARRAY count + heap refs that Impacket missed
English
2
0
2
95
Jacob Paullus
Jacob Paullus@psycep_·
gopacket is live! Check it out, it is intended to be a full reimplementation of Impacket in Go (it is in beta please send me bug reports) github.com/mandiant/gopac…
English
7
121
414
59K
HolyM
HolyM@HolyMoly84103·
@TwoSevenOneT 🤣 one of the best solution for every one who need to test av is work...
English
1
0
0
173
Jacob Paullus
Jacob Paullus@psycep_·
@HolyMoly84103 I tried to address underlying Impacket bugs during the process, so maybe… can you send me the specific error you are referring to?
English
1
0
1
750
HolyM retweetledi
Justin Elze
Justin Elze@HackingLZ·
If you’re into Impacket you might want to checkout Titanis. Perhaps it’s more opsec safe 🤷‍♂️ github.com/trustedsec/Tit…
English
8
77
366
33.7K
HolyM retweetledi
DirectoryRanger
DirectoryRanger@DirectoryRanger·
swarmer. tool for sneakily adding registry keys to HKCU without EDR/AV being able to see what's happening even if you don't have administrator access github.com/praetorian-inc…
English
0
22
86
4K
HolyM retweetledi
dylan davis
dylan davis@lildylannn·
I just dropped some research: DSCourier and would love for your opinion and to check it out!! It’s a novel post-exploitation technique abusing WinGet’s COM API to execute code through Microsoft-signed binaries. GitHub: github.com/DylanDavis1/DS… Blog: dylansec.com/DSCourier/
English
4
102
357
66.7K
HolyM retweetledi
Frey
Frey@freypwn·
damn this github.com/Nightmare-Ecli… is cool! 1. Defender scans it (runs as SYSTEM) 2. swap the file path using: NTFS junctions, mount points 3. Defender writes the file 4. path secretly points to: C:\Windows\System32\ 5. boom Windows executes it system shell
English
0
11
59
3.1K