4 D M

553 posts

4 D M banner
4 D M

4 D M

@aslam4dm

بِسْمِ ٱللَّٰهِ ٱلرَّحْمَٰنِ ٱلرَّحِيْمِ Pentesting stuff 🍉 views are my own

London Katılım Haziran 2024
270 Takip Edilen57 Takipçiler
Sabitlenmiş Tweet
4 D M
4 D M@aslam4dm·
Looking for a recon methodology on a web app ?? Look no further... 🔗👉🏼admapp.com/wapps/1-recon-… This is a graphical cheat-sheet that displays ways to find a variety of potential attack paths. Covers the following & more: ✔️ Tech Stack ✔️ Asset Discovery ✔️App Functionality
4 D M tweet media
English
2
11
37
4.7K
4 D M retweetledi
4 D M retweetledi
Josh Stroschein | The Cyber Yeti
📢 The FLARE team has launched the FLARE Learning Hub - a free resource to hone your malware analysis and reverse engineering skills! 🛠️ github.com/mandiant/flare… The initial launch brings with it: - An in-depth introduction to time-travel debugging (TTD) - A comprehensive Go language reference - An assembly crash course
English
0
117
471
23.8K
Happy Punch
Happy Punch@HappyPunch·
Deontay Wilder before punching Derek Chisora: “I’m sorry… I love you. I love you.” 😭😭😭 x.com/combat2747/sta…
English
152
515
10.8K
1.3M
4 D M
4 D M@aslam4dm·
York is lovely!
4 D M tweet media4 D M tweet media4 D M tweet media4 D M tweet media
English
0
0
0
14
4 D M
4 D M@aslam4dm·
@mrwtffacts Hah! This is like the prank in dumb and dumber 2, where Lloyd pretends to be paralyzed for 20 years
GIF
English
0
0
44
11.8K
WTF Facts
WTF Facts@mrwtffacts·
In Scotland, 22 year-old Kira Cousins faked her entire 9-month pregnancy. She wore a prosthetic bump, faked ultrasound scans & even threw a gender reveal party with the dad. On 10/10/25 she “gave birth” to a silicone doll named Bonnie-Leigh Joyce Gardner (5lbs 4oz). She later claimed the “baby” had a heart condition and informed her family, including her distraught boyfriend, that the baby had died. Her lie was exposed when her mum found the doll in her room. Kira confessed: “I wasn’t pregnant. There was no baby. I faked scans, messages, a birth story & acted like the doll was real. I f***d up & didn’t know how to stop”
English
861
826
16.8K
12.2M
4 D M retweetledi
Kyle Cucci
Kyle Cucci@d4rksystem·
I uploaded all the malware samples used in my book #EvasiveMalware to my Github: github.com/d4rksystem/Eva… I received some questions about the lab samples, so just posting it for everyone here 🤓
English
5
78
338
12.2K
4 D M retweetledi
Gabe Nicholson
Gabe Nicholson@gabe_mohit·
Support Walter White
English
3K
28.5K
297.8K
73.7M
4 D M
4 D M@aslam4dm·
@UK_Daniel_Card Probably an unpopular way to have beans on toast, but I typically sprinkle some cheddar cheese on the top and have it melted. Would highly recommend!
English
1
0
1
21
mRr3b00t
mRr3b00t@UK_Daniel_Card·
It’s this kind of weather day
mRr3b00t tweet media
English
14
0
26
1.2K
𝗚𝗿𝗮𝗻𝗱𝗽𝗮.🧠
Women want masculine men, not men that pedestalise them. She wants to be dominated. She wants to be told what to do, how & when. She wants to look up to the man, not down on him. This is why it's very important for a man not to make a a woman the centre of his life because he is supposed to be her's. Focus on your purpose, whichever woman becomes part of your life should adjust to you.
𝗚𝗿𝗮𝗻𝗱𝗽𝗮.🧠 tweet media
English
37
9
122
69.9K
Morbid Knowledge
Morbid Knowledge@MorbidKnowledge·
German doctor quits her life to marry a man she met on Roblox. Muhammad Akmal, a 22-year-old from a rural village in Mandi Bahauddin, Pakistan, met Dr. Selma, a 26-year-old German-Bosnian doctor, while playing the online game Roblox. After five months of conversation, he proposed and she booked a flight to Pakistan. They were married in a traditional ceremony, with both families present. Selma has since moved permanently to the village, learning Punjabi and Urdu and adjusting to daily life including making roti and hand-washing clothes, things she had never done before.
Morbid Knowledge tweet media
English
629
265
4.5K
1.6M
4 D M retweetledi
R136a1
R136a1@TheEnergyStory·
TeamPCP msbuild.exe Malware Analysis Here is a breakdown of the execution chain, featuring EDR bypasses and steganography. 🛡️ 1. Evasion • Dynamic SSN Resolution: The malware resolves native API functions (e.g., ZwAllocateVirtualMemory, NtProtectVirtualMemory) by matching their DJB2 hashes to dynamically extract their Syscall Service Numbers (SSNs). • Trampoline Syscalls: To bypass EDR user-land hooks, it then searches the ntdll.dll .text section for the first occurrence of a clean syscall; ret gadget (0x0f05C3), typically finding it inside NtAccessCheck. • Custom Syscall Stubs: Finally, it uses the extracted SSNs with custom syscall stubs. These stubs load the appropriate registers and jump to the located ntdll.dll gadget, cleanly executing indirect syscalls from a legitimate memory region. • ETW Blinding: Neutralizes telemetry by patching the first instruction of EtwEventWrite with 0xC3 (ret). 🖼️ 2. Steganography • Spawns a suspended dllhost.exe child process. • Extracts the Adaptix C2 payload (shellcode loader + payload) embedded into the Red, Green, and Blue color channels of the image, while locking the Alpha (transparency) channel to fully opaque (FF). • Writes the payload directly into an allocated buffer in dllhost.exe. 💉 3. Injection • Instead of relying on one method, it sequentially tries multiple techniques to execute the payload in dllhost.exe: 1️⃣ APC Injection: NtQueueApcThread, NtResumeThread 2️⃣ Thread Execution Hijacking: ZwGetContextThread, ZwSetContextThread, NtResumeThread 3️⃣ Remote Thread Injection: NtCreateThreadEx, NtResumeThread (Note: APIs for process hollowing and doppelgänging are also present but remain unused). 📡 4. Adaptix C2 Payload • C2 URL: checkmarx[.]zone/telemetry/checkmarx.json (Defanged) • Exfiltration: HTTP POST requests using the X-Content-ID header for encoded/encrypted data. • User-Agent: Mozilla/5.0 (Windows NT 6.2; rv:20.0) Gecko/20121202 Firefox/20.0 🔬 5. IOCs • Analyzed Sample: virustotal.com/gui/file/72903… • Related Sample: virustotal.com/gui/file/a985b… Overall, a nice mix of methods, but nothing novel.
English
11
80
438
52.6K
4 D M retweetledi
Smukx.E
Smukx.E@5mukx·
Maldev Basics: Modifying the Assembly of Binaries and Shellcode for Evasion @luisgerardomoret_69654/modifying-the-assembly-of-binaries-and-shellcode-for-evasion-687874c5eb00" target="_blank" rel="nofollow noopener">medium.com/@luisgerardomo
Smukx.E tweet media
English
0
42
231
9.6K