PatchRequest

148 posts

PatchRequest banner
PatchRequest

PatchRequest

@PatchRequest

Pentesting | Red Teaming https://t.co/MU7dqIIBye Game Hacking | Anti Cheat https://t.co/6XSq9gGrWq

Deutschland Katılım Temmuz 2019
395 Takip Edilen83 Takipçiler
Sabitlenmiş Tweet
PatchRequest
PatchRequest@PatchRequest·
Currently analyzing the leaks regarding conti gang. Found a file with a Mega account. PW is in the file too. I think I should not log into it right? :D
English
1
0
2
0
PatchRequest
PatchRequest@PatchRequest·
Continued working on my proof-of-concept anticheat. These are the events visible to an anticheat when you use default DLL injection; pretty obvious, I'd say :) github.com/PatchRequest/P…
PatchRequest tweet media
English
0
0
1
64
PatchRequest
PatchRequest@PatchRequest·
@UK_Daniel_Card In 2025 he did: Jan – CISSP Jan – CCSP March – OSED July – OSWE Oct – OSCE3 Oct – CRTO Sure, just complete all of the "hardest" certs in a month or two while being a Deputy Manager and Red Team Lead at a Big4 company, and while running a blog with 32 pages of articles
English
0
0
3
422
PatchRequest
PatchRequest@PatchRequest·
@UK_Daniel_Card Saw his profile earlier too. He would have had to buy the certs. He supposedly completed all of them within three years, doing certifications like OSCE3 and CRTO at the same time in two months, right after finishing other certs in another two months, etc. It’s super suspicious.
English
2
0
5
3.9K
mRr3b00t
mRr3b00t@UK_Daniel_Card·
WHAT THE FUCK
mRr3b00t tweet media
English
122
34
736
134.8K
PatchRequest
PatchRequest@PatchRequest·
@Salsa12__ Remove PPL should trigger PatchGuard, how did you avoid it?
English
0
0
0
27
0x12 Dark Development
0x12 Dark Development@Salsa12__·
🚀 PPLReaper Release Windows kernel driver + userland tool to inspect and manipulate Protected Process Light (PPL): • Query PPL • Remove PPL • Assign PPL github.com/S12cybersecuri… ⚠️ The driver must be properly signed or the system must be in Test Mode
0x12 Dark Development tweet media
English
3
13
63
2.5K
PatchRequest
PatchRequest@PatchRequest·
@ipurple Patchguard is already detecting this and giving a bsod
English
0
0
1
94
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
Disabling PPL Protection on Windows Processes @s12deff/disabling-ppl-protection-on-windows-processes-0cb77a065939" target="_blank" rel="nofollow noopener">medium.com/@s12deff/disab…
English
3
13
83
6.4K
PatchRequest
PatchRequest@PatchRequest·
Basic, but I guess effective enough to catch some script kiddies. I added a blacklist of words that should not appear in any running process. I think some cheaters actually get caught in the wild by this lol github.com/PatchRequest/P…
PatchRequest tweet media
English
0
0
0
103
PatchRequest
PatchRequest@PatchRequest·
I wanted to consume some ETW providers, but it turned out I needed to be a PPL. So thats a side quest I worked on for now. Not sure how useful this is for protecting the game, but the protection for my own usermode part should be useful for the anti-cheat github.com/PatchRequest/P…
PatchRequest tweet media
English
0
0
1
127
PatchRequest
PatchRequest@PatchRequest·
This is how the default settings of the @GuidedHacking injector currently appear in my anti-cheat. You can clearly see the sequence: WriteProcessMemory → DLL image load → new thread inside the newly loaded DLL. github.com/PatchRequest/P…
PatchRequest tweet media
English
1
0
0
76
PatchRequest
PatchRequest@PatchRequest·
Still learning and pushing my anticheat forward. Implemented disk vs memory integrity checks to detect module tampering. Starting with the .text section simple but the most important one.
PatchRequest tweet media
English
0
0
1
157
PatchRequest retweetledi
Cerast Intelligence
Cerast Intelligence@CerastIntel·
Vibe Coding with AI was the best ever for Bug Bounty. The DevOps is so bad that I love it. While generating tokens, it somehow generates infosec jobs too Find more at: cerast-intelligence.com
Cerast Intelligence tweet media
English
0
1
2
225
PatchRequest retweetledi
Cerast Intelligence
Cerast Intelligence@CerastIntel·
Sneak Peek of what’s coming October 1st Be ready | millions of never-before-seen exposed files will become searchable cerast-intelligence.com
Cerast Intelligence tweet media
English
1
1
7
646
PatchRequest
PatchRequest@PatchRequest·
Injecting a DLL into every process and overwriting WinAPI functions can easily go wrong. My anti-cheat crashed the PC with the pop-ups :) Is this technique a thing for anti-cheats? I mainly know it from EDR and AV github.com/PatchRequest/O…
PatchRequest tweet media
English
0
0
0
69
PatchRequest
PatchRequest@PatchRequest·
I think scoring applications based on ProcAge, ExeAge, and their behavior is a valid approach to determine whether it’s just Task Manager requesting a handle for the billionth time or a Python CreateRemoteThread PoC github.com/PatchRequest/O…
PatchRequest tweet media
English
0
0
0
61
PatchRequest
PatchRequest@PatchRequest·
Started detecting remote thread creation, pretty cool if you ask me :) At first I was confused until I realized my notify routine runs in the process context of the invoker, then it was pretty easy to detect github.com/PatchRequest/O…
PatchRequest tweet media
English
0
0
0
58