William Burgess

2K posts

William Burgess banner
William Burgess

William Burgess

@joehowwolf

Ex-theoretical physicist, currently terrible hacker and wannabe security researcher. Views are, regrettably, my own. Likes = bookmarks

Katılım Eylül 2014
4K Takip Edilen2.3K Takipçiler
William Burgess retweetledi
Neil Zeghidour
Neil Zeghidour@neilzegh·
Me defending my O(n^3) solution to the coding interviewer.
English
423
5.1K
49.7K
4M
William Burgess retweetledi
Sean Heelan
Sean Heelan@seanhn·
Blog post: On the Coming Industrialisation of Exploit Generation with LLMs sean.heelan.io/2026/01/18/on-… TL;DR: I ran an experiment with GPT-5.2 and Opus 4.5 based agents to generate exploits for a zeroday QuickJS bug. They're pretty good at it. Code: github.com/SeanHeelan/ana…
English
29
236
1.1K
226.3K
William Burgess retweetledi
Connor McGarr
Connor McGarr@33y0re·
[New @originhq blog+POC] No PPL? No problem! SecurityTrace, an undocumented ETW feature, restricts some AutoLogger traces to PPL only — yet we found this current design still allows non-PPL processes to consume from Threat-Intelligence as admin only! originhq.com/blog/securityt…
English
4
82
175
21.3K
William Burgess retweetledi
Connor McGarr
Connor McGarr@33y0re·
Want to consume Microsoft-Windows-Threat-Intelligence but Antimalware-PPL getting you down? No problem! I will post a blog & POC soon - but this allows you to consume Threat-Intelligence without PPL _and_ w/o any kernel patching/driver loading gymnastics! Only need admin!
English
5
39
214
23.4K
William Burgess retweetledi
Cobalt Strike
Cobalt Strike@_CobaltStrike·
Cobalt Strike 4.12 is LIVE, complete with a new look for the GUI! Additionally, we're introducing: - A REST API - User Defined Command and Control (UDC2) - New process injection options - New UAC bypasses - and more! Check out the release blog for details. ow.ly/RSmE50Xx1OS
Cobalt Strike tweet media
English
4
30
94
45.3K
William Burgess retweetledi
Cobalt Strike
Cobalt Strike@_CobaltStrike·
New Blog: Based on his talk at Black Hat, @0xTriboulet discusses integrating Windows AI/ML APIs into Cobalt Strike’s workflows and presents proof-of-concept implementations for AI-augmented post-exploitation capabilities in Cobalt Strike. ow.ly/8hSO50WWTSW
Cobalt Strike tweet media
English
2
31
63
13.5K
Tijme Gommers
Tijme Gommers@tijme·
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. github.com/tijme/dittobyt…
English
11
98
257
27.6K
William Burgess
William Burgess@joehowwolf·
@DaniLJ94 Probably not slides but I plan on releasing blog + code when i can (unsure if conf is recorded, it was live streamed last year tho)
English
0
0
5
182
ATTL4S
ATTL4S@DaniLJ94·
@joehowwolf Are you planning to release the slides after the con? or any recording? I'd be very interested
English
1
0
1
403
William Burgess
William Burgess@joehowwolf·
I will be presenting at Beacon conf next week on “Linkers and Loaders: Experiments with Crystal Palace”. If you enjoy filthy PIC tradecraft it may be of interest! eventbrite.co.uk/e/beacon-25-ti…
English
3
14
49
11.5K
Rasta Mouse
Rasta Mouse@_RastaMouse·
I have call stack spoofing working inside a udrl-vs project, but it crashes when I build it into PIC. Kill me now @joehowwolf.
English
1
0
8
2K
William Burgess retweetledi
Rasta Mouse
Rasta Mouse@_RastaMouse·
Published a small collection of PIC loaders for Cobalt Strike, based on my experiments with Crystal Palace. github.com/rasta-mouse/Cr…
English
2
66
225
13.8K
William Burgess retweetledi
TrustedSec
TrustedSec@TrustedSec·
Chrome Remote Desktop can offer red teamers a subtle way to bypass restrictions—if they know how to use it. In this blog, @Oddvarmoe reveals a practical guide to repurposing Chrome Remote Desktop on red team operations. Read it now! trustedsec.com/blog/abusing-c…
English
0
84
234
29.1K