sabotage

116 posts

sabotage banner
sabotage

sabotage

@saab_sec

Nighthawk dev team @Mdseclabs

xxxxx Katılım Mart 2020
267 Takip Edilen800 Takipçiler
sabotage retweetledi
MDSec
MDSec@MDSecLabs·
Our latest post on the blog details a Windows EoP courtesy of @filip_dragovic... "Total Recall – Retracing Your Steps Back to NT AUTHORITY\SYSTEM" - mdsec.co.uk/2026/02/total-…
English
0
87
224
34K
sabotage retweetledi
Dominic Chell 👻
Dominic Chell 👻@domchell·
My thoughts are yes, red teaming has got significantly harder over the last few years. The knock on effect is: 1) engagements need more time, 2) teams who don't invest heavily in R&D (either in-house or outsourced) will be left behind, 3) there's less things shared publicly as a consequence, 4) lots of teams have tried to compensate by assuming breach, which as a result has led to less innovation in the IA space However, I disagree that IA is anywhere near dead even targeting the top 1%. The vast majority of our engagements have a large IA component and we're still successful in >75% of cases. Yes the points mentioned are a pita - AWL is a great control, but there's equally a plethora of file formats that support scripting; get creative - Yes MOTW restricts some things - but there's a variety of ways around it if you're creative (and I'm not talking about ISOs 🙄)
Chris Spehn@ConsciousHacker

I guess we'll talk a bit about modern red teaming. The difficulty has increased severely. Lots of people be like just vibe code a stage0 with legit code for your pretext. How are you delivering it to bypass app control? Lots of words, no substance.

English
7
40
223
36.4K
sabotage retweetledi
Dominic Chell 👻
Dominic Chell 👻@domchell·
One of the new features we built for #Nighthawk customers is HawkEye. This is an AI bot built on Opus 4.5 that uses RAG to ingest all the #Nighthawk documentation, sample profiles, APIs, and sample source code. It's able to help explain features, build profiles, write source code for modules and much much more...
Dominic Chell 👻 tweet media
English
3
4
47
3.2K
sabotage retweetledi
Connor McGarr
Connor McGarr@33y0re·
Want to consume Microsoft-Windows-Threat-Intelligence but Antimalware-PPL getting you down? No problem! I will post a blog & POC soon - but this allows you to consume Threat-Intelligence without PPL _and_ w/o any kernel patching/driver loading gymnastics! Only need admin!
English
5
39
213
23.4K
sabotage retweetledi
winterknife 🌻
winterknife 🌻@_winterknife_·
Whether you're learning x86 instruction encoding or writing YARA rules, ZydisInfo is an amazing (yet slightly underrated) tool for the job.
winterknife 🌻 tweet media
English
4
81
579
27.7K
sabotage retweetledi
watchTowr
watchTowr@watchtowrcyber·
Today, we’re releasing watchTowr Labs’ @chudyPB’s BlackHat .NET research, owning Barracuda, Ivanti and more solutions. Enjoy the read as Piotr explains a new .NET Framework primitive, used to achieve pre- and post-auth RCE on numerous enterprise appliances. labs.watchtowr.com/soapwn-pwning-…
English
3
110
373
87.1K
sabotage retweetledi
Outflank
Outflank@OutflankNL·
New blog by Outflank’s @KyleAvery: Linux process injection leveraging seccomp to inject shared libraries into Linux processes without LD_PRELOAD, ptrace nor elevated privileges. Parent-to-child injection at any ptrace_scope level 💪😎 Tech details here: ow.ly/KwBh50XGvrC
GIF
English
1
54
152
12.9K
sabotage retweetledi
Anton Zhiyanov
Anton Zhiyanov@ohmypy·
Thank you all for helping me choose the cover for the Go Concurrency book. I didn't expect so much participation, and I really appreciate it! Here's the final version, along with the table of contents.
Anton Zhiyanov tweet media
English
8
37
551
21.2K
sabotage retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
Low-Level Software Security for Compiler Developers If you ever wanted a textbook-style guide to memory safety bugs, undefined behavior, exploit mitigations, side channels, etc. All in one spot, this free book is it: llsoftsec.github.io/llsoftsecbook/
Alex Plaskett tweet media
English
0
73
298
14.9K
sabotage
sabotage@saab_sec·
@5mukx Thx for the shout out mate! :)
English
1
0
1
91
sabotage
sabotage@saab_sec·
@domchell Didn't know this is how detection worked!!😅. learning something new everyday!
sabotage tweet media
English
0
0
10
937
sabotage
sabotage@saab_sec·
@Danukeru @Octoberfest73 @MDSecLabs Because I am using addPreEmitPass() hook which gets initialized before any plugin is loaded. The pass in your project works at the IR level, not touching any backend components directly.
English
0
0
0
74
MDSec
MDSec@MDSecLabs·
Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec mdsec.co.uk/2025/10/functi…
MDSec tweet media
English
1
70
216
30.1K
Octoberfest7
Octoberfest7@Octoberfest73·
@MDSecLabs @saab_sec Nice work. Question though, how / why is it safe to use TEB->userReserved fields arbitrarily? I can’t find much on them, but the little I can suggests various user mode DLLs might use these fields at some point so curious if A. That’s true and B. How you handle/mitigate that
English
1
0
11
1.9K