Clement Rouault

463 posts

Clement Rouault

Clement Rouault

@hakril

Python (ab)user / Security / Windows internals / @ExaTrack

Katılım Haziran 2012
532 Takip Edilen1.1K Takipçiler
Clement Rouault retweetledi
LE BERRE Stéfan
LE BERRE Stéfan@Heurs·
🚀 Take your malware analysis skills to the next level with Exalyze Discover our unique capabilities to compare malware code with our entire database, identifying similar samples and uncovering hidden connections. 👉 exalyze.io @Exalyze_io
English
0
13
11
958
Clement Rouault retweetledi
Erik Pistelli
Erik Pistelli@erikpistelli·
🚨 WARNING: A fake domain—cff-explorer[.]com—has been registered to distribute malware. It currently appears as the top Google result when searching for "CFF Explorer". The only legitimate domain is ntcore.com.
English
1
8
10
1.8K
Clement Rouault retweetledi
Nauseam (in sf!)
Nauseam (in sf!)@ChadNauseam·
"A calculator app? Anyone could make that." Not true. A calculator should show you the result of the mathematical expression you entered. That's much, much harder than it sounds. What I'm about to tell you is the greatest calculator app development story ever told.
Nauseam (in sf!) tweet media
English
572
4.1K
33.4K
4.5M
Clement Rouault retweetledi
REverse_Tactics
REverse_Tactics@Reverse_Tactics·
For the first time, our training "Bug Hunting in Hypervisors" is open to the public at @reconmtl ! Designed for security researchers,we will dive into VM escapes, hypervisor attack surfaces, and real-world exploitation. More info: recon.cx/2025/trainingB…
English
0
5
23
7.2K
Clement Rouault retweetledi
Colin Finck
Colin Finck@colinfinck·
The second part of my #WinDbg deep-dive into the #Windows #bootloader is up: Get ready for a decades-old registry structure, unique sorting algorithms, and lots of corner cases. The result is a modern Rust replacement for Mark Russinovich's LoadOrder tool: colinfinck.de/posts/nt-load-…
Colin Finck tweet media
English
0
41
143
9.2K
Clement Rouault retweetledi
Petr Beneš
Petr Beneš@PetrBenes·
After 6 years, I made a blog thingy again. This time about MmScrubMemory. An innocuous looking function that has bitten my ass several times in the last several years. And if you're developing a hypervisor, it might've bitten yours, too. wbenny.github.io/2024-11-21-mms…
English
4
27
97
10K
Clement Rouault retweetledi
watchTowr
watchTowr@watchtowrcyber·
in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivalents of saying 'turn off auth and give me a shell'. Enjoy! labs.watchtowr.com/pots-and-pans-…
English
12
168
433
101.5K
Clement Rouault
Clement Rouault@hakril·
In our search for new forensic artifacts at @ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/
English
0
39
58
13.1K
Clement Rouault retweetledi
LE BERRE Stéfan
LE BERRE Stéfan@Heurs·
Kdrill, an open source tool to check if your kernel is rootkited🔥 A python tool to analyze memory dumps AND live kernel. No dep, py2/3, no symbols 💪 It rebuild on the fly kernel structs and check suspicious modifications (and if patchguard is running 👀) github.com/ExaTrack/Kdrill
English
2
76
152
17.6K
Clement Rouault
Clement Rouault@hakril·
After nearly 10 years of existence, years of use in production on 10k+ computers. The new PythonForWindows release is 1.0.0 \o/ This release adds three important things: official python 3 support, full Unicode support for py2/py3 & CI testing on GitHub ! github.com/hakril/PythonF…
English
2
25
57
7K
Clement Rouault retweetledi
James Forshaw
James Forshaw@tiraniddo·
Just because you get access denied accessing a folder, it doesn't mean you can't get access. A quick look at bypassing the security on the WindowsApps folder. tiraniddo.dev/2024/06/workin…
English
6
179
514
64.7K
Clement Rouault retweetledi
REverse_Tactics
REverse_Tactics@Reverse_Tactics·
It's a full win! During the first day of #Pwn2Own Vancouver 2024, we demonstrated a fullchain exploit that escaped from an Oracle Virtualbox's virtual machine, followed by a local elevation of privilege on the Windows 11 host!
REverse_Tactics tweet media
TrendAI Zero Day Initiative@thezdi

Confirmed! Bruno PUJOS and Corentin BAYET from REverse Tactics (@Reverse_Tactics) combined 2 #VirtualBox bugs and a #Windows UAF. They win $90,000 and 9 Master of Pwn points. #Pwn2Own #P2OVancouver

English
2
7
30
3.9K