sinusoid

2.9K posts

sinusoid banner
sinusoid

sinusoid

@the_bit_diddler

Offensive research dude. Occasional CTF player (looking for a team!)

Katılım Temmuz 2016
1.7K Takip Edilen1.7K Takipçiler
vx-underground
vx-underground@vxunderground·
I'm bad with names. What do I name my Polymorphic Mutation Engine thingy?
English
204
8
424
36.4K
sinusoid
sinusoid@the_bit_diddler·
@maple3142 @RBTree_ This point resonates with my internal thoughts at the moment. The underpinnings of CTFs were (are?) the excitement of discovery. Throwing in things like a shorter timeline (one day vs. two, etc.), and it's not surprising the path of least resistance is taken.
English
0
0
0
74
maple3142
maple3142@maple3142·
@RBTree_ Perhaps removing the competitive aspect of CTF would be the only choice in the future, like what alpacahack.com/daily does. You just play it for fun and learn about new things you don't know.
English
2
10
70
2.8K
RBTree
RBTree@RBTree_·
I don't have any opinion on using LLMs in CTFs. It’s just the way the world is going. The sad thing is, I feel like it's robbing people of opportunities to learn. Of course, you can play CTFs without LLMs, but doing so may cost you your chance to win, or qualify for the finals.
English
8
11
179
8K
Manas Ghandat
Manas Ghandat@0xP0ch1ta·
@es3n1n Well I feel that we need to change the format at this point. And it should be such that AI slop is prevented as well as fix the team size issue. Well someone could try something similar to overseers.ctf.ing/DEF%20CON%20CT…
English
2
0
5
822
es3n1n
es3n1n@es3n1n·
i know it’s a very frustrating topic but im seriously getting tired of ctf people complaining about llm usage, i agree its terrible but your “hot take” isn’t helping
English
8
4
127
7K
sinusoid retweetledi
Karsten Hahn
Karsten Hahn@struppigel·
New blog: Using LLMs the right way for malware analysis 💡Tips for building an autonomous AI analysis lab on a 12 yo laptop and getting stuff done faster without loss of accuracy. blog.gdatasoftware.com/2026/03/38381-…
Karsten Hahn tweet media
English
8
129
439
35.8K
sinusoid
sinusoid@the_bit_diddler·
@gf_256 @angelroom0 It's always a damned bummer. Generally speaking, you all have better aggregated resources akin to kycnot.me I'd be very interested.
English
0
0
0
17
blanche 🐾
blanche 🐾@angelroom0·
im sorry for being transgender @hetzner_online please let me verify i just want a vps
blanche 🐾 tweet media
English
34
37
2.6K
87.3K
sinusoid retweetledi
zabutom
zabutom@zabutom·
Realtime code, handmade ascii animations and raw tracker music. The demo ’CMOS Cosmos’ by Razor 1911 in 2025 #demoscene #ascii #msdos
English
96
566
3.3K
126.4K
sinusoid
sinusoid@the_bit_diddler·
@b1ack0wl Been following for some time, about when he was writing a ROP-gadget finder for ARM. Was just reading the blog on this and FORCEDENTRY, which still hails as the most insane logic implementation I can recall.
English
0
0
3
116
sinusoid
sinusoid@the_bit_diddler·
@bellafusari1 @DistrictCon I don't know how I saw this a year late, but turning a vape into a Glade PlugIn would've been hilarious.
English
1
0
1
32
bells
bells@bellafusari1·
looking for a junkyard submission for @DistrictCon for an RCE in a vape in an EOL product that expels all of the vape juice into vapor
English
5
3
32
3.1K
sinusoid retweetledi
flux
flux@0xfluxsec·
I've tried something new! I have streamed some unfiltered coding, writing a module to detect malicious bytes in a shellcode injection scenario for an EDR that would use the System Call Integrity Layer project: youtube.com/watch?v=gK4OXh… If this content is useful, or you like it, please let me know and give me some ideas what you would want to see! I want to grow in myself and help produce content that would be beneficial for our amazing cyber community! #blueteam #cybersecurity #redteam #driver #rust #rustlang #infosec #rustdriver #soc #cyber #cti #informationsecurity #infosec
YouTube video
YouTube
English
1
17
68
6.2K
sinusoid retweetledi
itszn
itszn@itszn13·
When MicroQuickJS released, I spent 8.5 hours to summon an Exploit for it. Here is the Fault: var arr = new Array(30) var attack = { valueOf: function() { arr.length = 0 arr.length = 3 return 10 } } arr.splice(attack, 30) I document the full Ritual Process below
itszn tweet media
itszn@itszn13

New JS engine, old JS vulns :) Found a bug and wrote an exploit in 8 hours 645da364a8089c43953b345d3004fc76148cb2f136f74e211429ddc8452846d1 exp-shell.js ./mqjs ./exp-shell.js LEAKED: 77b6 1c5ff205 LIBC BASE: 77b6 1d600000 STACK PTR: 7ffd 143e1bb8 WROTE ROP CHAIN $ whoami nyan

English
4
20
163
25.7K
sinusoid retweetledi
cts🌸
cts🌸@gf_256·
i made a browser extension
English
39
238
4.5K
102.8K
sinusoid retweetledi
Outflank
Outflank@OutflankNL·
Let's play peekaboo with PatchGuard! Read our blog post about hiding processes on modern Windows systems with HVCI enabled: outflank.nl/blog/2026/01/0…
Outflank tweet media
English
6
126
316
25.5K
sinusoid retweetledi
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
🔥Introducing a new Red Team tool - SessionHop: github.com/3lp4tr0n/Sessi… SessionHop utilizes the IHxHelpPaneServer COM object to hijack specified user sessions. This session hijacking technique is an alternative to remote process injection or dumping LSASS. Kudos to @tiraniddo for first discovering this years ago. Blue Team tip: Look for unusual child processes spawning from HelpPane.exe
English
5
138
396
34K
sinusoid retweetledi
_Ray
_Ray@_RayRT·
Reusing part of the ESC1-unPAC BOF code to create a ShadowCreds + unPAC BOF 1. Write msDS-KeyCredentialLink attribute using obfuscated LDAP queries. 2. Authenticate to the KDC using PKINIT. 3. unPAC-the-hash. 4. Cleanup msDS-KeyCredentialLink. github.com/RayRRT/BOFs/tr…
English
4
52
193
12.1K
sinusoid retweetledi
blackorbird
blackorbird@blackorbird·
ProfileHound is a post-escalation tool to help find and achieve red-teaming objectives by locating domain user profiles on machines. It uses the BloodHound OpenGraph format to build a new edge called which determines if a user profile exists on a computer. This edge allows operators to make informed decisions about which computers to target for looting secrets. github.com/m4lwhere/profi…
blackorbird tweet media
English
1
43
180
12.2K
sinusoid retweetledi
flux
flux@0xfluxsec·
I've merged the first PR of 2026 for Wyrm, v0.7.2! This brings: - Spawn via Early Cascade Injection. - 'Wyrm Object Files (WOFs)' which allows the operator to extend the agent's capability via C/C++/Rust/(probably even Zig) - currently only at compile time. Runtime WOFs will be released in due course. - The inject command for injecting Wyrm into another process. - AMSI bypass uses VEH^2 over amsi.dll patching. Perhaps I can split this out into a profile to allow the operator to choose which method they would like. - Refelctive DLL inherits ETW patching from your profile.toml. - C2 stability fixes. Thanks everyone for your support in 2025, lets make 2026 the year of the dragon 🐉 github.com/0xflux/Wyrm #redteam #blueteam #wyrm #pentesting #cyber #infosec #maldev #cybersecurity #pentest #tools #rust #rustlang
English
3
23
103
9.6K
sinusoid retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
Using ADCS to Attack HTTPS-Enabled WSUS Clients: @cookieTheft and I have extended the research by @Coontzy1 on WSUS attacks and explored how to leverage misconfigured ADCS templates to gain code execution on HTTPS-enabled WSUS clients. 1/2🧵
Alex Neff tweet media
English
2
79
290
25.7K