Sabitlenmiş Tweet
Mohamed El Azaar
378 posts

Mohamed El Azaar
@med0x2e
RedTeamer & Security Researcher, used to be a full-stack Dev, Manga/Anime Otaku.
Dubai, United Arab Emirates Katılım Mart 2013
277 Takip Edilen1.6K Takipçiler

@vxunderground Can I get it ? How to pay for it ? (Ur website states it is sold out)
English

@r00t0v3rr1d3 Well, a NuC then, but it is only the payload part anyway, and it is usually a matter of preference, sticking with Intel Macs has a lot of downsides these days…
English

@med0x2e I didn’t include the “cloud” in my previous statement, but again, you are using another “computer” as a solution. And I’m certainly not putting payloads of mine that need testing in an Azure VM.
English

@r00t0v3rr1d3 Not all VMs need to be on Intel devices, did some initial testing with ARM VMs and are good enough for most of RT work, I found win11 (arm) x86 emulation surprisingly good, the exception here is x86/64 payload testing.., an azure Win VM should cover that..
English

@med0x2e I love how everyone’s solution is to use another computer or separate server hardware. Don’t get me wrong, love the home lab scene, but I’m also not going to spend “Apple money” on something to browse the web or console into the VMs on a server. If it MUST be a Mac, Intel only.
English
Mohamed El Azaar retweetledi

I've audited the Android kernel in late 2023, and reported 10+ kernel bugs to Google, along with 2 exploits. Today, I'm releasing the first exploit, targeting the Mali GPU on Pixel devices, accessible from an untrusted_app context.
github.com/0x36/Pixel_GPU…
English

@C5pider Great work Paul :), Also switched to PIC instead of PE loaders 2 years ago and have been wondering ever since if it is only me or I’m doing something wrong…
English

Modern implant design: position independent malware development.
A small blog post on how to design "modern" malware with features like global variables, raw strings, and compile-time hashing.
5pider.net/blog/2024/01/2…
Repo: github.com/Cracked5pider/…
English

@vxunderground @Donorbox I hope they can reconsider that decision, any alternatives?
English

@UK_Daniel_Card They are “Advanced” still, otherwise threat intel report wouldn’t sell well.
English

@rad9800 Real APTs have Time & Resources on their side, they are not bound to 4/8 weeks of time for both preparation and execution.., as long as that is true, Imo their Tools will be always more advanced (ex; doublepulsar)
English

@an0n_r0 Nice work, I remember making it work few years back when Dinvoke was released, I can’t seem to find that piece of code though.., but I remember it was messy, ur approach is much cleaner (ILmerge)
English
Mohamed El Azaar retweetledi

What worked for me after a long trial and error process: used ILMerge for linking the SimpleStager.exe and DInvoke.dll assemblies together.
github.com/dotnet/ILMerge
Other solutions (Costura Fody or ConfuserEx compressor) were failing in the GadgetToJScript deserialization phase.
English

@dec0ne Good stuff, A less-automated version of it, if you were not aware; github.com/med0x2e/NTLMRe…
English

Introducing DavRelayUp - A port of #KrbRelayUp with modifications to allow for NTLM relay from WebDAV to LDAP and abuse #RBCD in order achieve #LPE in domain-joined windows workstations where LDAP signing is not enforced.
Demo in second tweet.
github.com/Dec0ne/DavRela…
English

Yo @med0x2e @darkt3rr0r_ , watch this out
Can't believe it's a fan animation. Zenitsu vs Kaigaku #demonslayerfanart
youtube.com/watch?v=uNvaio…

YouTube
English











