zer0phat

40 posts

zer0phat banner
zer0phat

zer0phat

@zer0phat

Cyber security & electronics enthusiast

Katılım Mayıs 2020
77 Takip Edilen19 Takipçiler
zer0phat retweetledi
RedTeamVillage
RedTeamVillage@RedTeamVillage_·
💻 ModuleOverride – Changing a Tyre Whilst Driving – @zer0phat & @kreepsec teach process injection using existing memory sections to run malicious shellcode. Hands-on demos and detection strategy discussions at @redteamvillage_ during @defcon 33! ⚡
RedTeamVillage tweet media
English
0
3
9
1.1K
zer0phat
zer0phat@zer0phat·
Part 1.5 is finally out! Stay tuned for part two and the source code release. If I’m not that lazy, it might be out by the end of next week! Follow @5hid_ and have a look at his past works! He’s a good lad
5hid@5hid_

☣️💉🧸 PEBby injector 5hidobu.github.io/2024-12-03-PEB… Accessing the _PEB structure enables the extraction of base addresses for loaded modules, which can be used to resolve specific functions within those modules. Follow @zer0phat to read about ModuleOverride injection technique!

English
0
0
1
132
zer0phat
zer0phat@zer0phat·
New Blog and new blogpost! This is around the an alternative idea for injecting your shellcodes in memory. I called it ModuleOverride. I also teamed up with @5hid_ who's gonna release an in-depth analysis of such technique. zer0phat.github.io/injection/tech…
zer0phat tweet media
English
0
3
1
363
zer0phat retweetledi
chompie
chompie@chompie1337·
So excited to finally release my blog post- Kernel Pwning with eBPF: a Love Story. I cover eBPF, the verifier, debugging, exploitation, mitigations and other cool findings! I do root cause analysis and exploit CVE-2021-3490 for LPE with PoC included. graplsecurity.com/post/kernel-pw…
English
28
535
1.7K
0