MetallicHack

927 posts

MetallicHack banner
MetallicHack

MetallicHack

@MetallicHack

🇨🇵 Cybersecurity engineer enjoying Windows & AD security, DFIR and detection engineering @TheDFIRReport analyst

Entrou em Kasım 2020
386 Seguindo841 Seguidores
MetallicHack retweetou
Sylvain Peyrefitte
Sylvain Peyrefitte@citronneur·
klist2kirbi is a tool that convert klist.exe output into a valid kirbi ticket ! Available in kerlab github.com/airbus-cert/ke… 🔵 Microsoft-Windows-Security-Kerberos #ETW provider exposed the event ID 202 that will monitor attempts to export sessions keys🔵
English
0
39
110
6.6K
MetallicHack retweetou
Connor McGarr
Connor McGarr@33y0re·
[New @originhq blog+POC] No PPL? No problem! SecurityTrace, an undocumented ETW feature, restricts some AutoLogger traces to PPL only — yet we found this current design still allows non-PPL processes to consume from Threat-Intelligence as admin only! originhq.com/blog/securityt…
English
4
82
175
21.2K
MetallicHack retweetou
SpecterOps
SpecterOps@SpecterOps·
WSL2 is a powerful attacker hideout because it runs as a separate Hyper-V VM, and defenders rarely monitor it. Daniel Mayer explains how attackers pivot into WSL2 and what it took to build tooling that works across WSL2 versions. Read more ⤵️ ghst.ly/45fPUma
English
8
174
729
102.6K
MetallicHack retweetou
R136a1
R136a1@TheEnergyStory·
This blog post provides an in-depth analysis of #Turla's #Kazuar v3 loader and how it tries to slip past modern defenses: • Sideloading via MFC satellite DLLs • Control flow redirection trick (+ POC) • Patchless ETW and AMSI bypasses (+ POC) • Extensive COM usage for registry, file and folder operations (+ partial POC) • Strings encryption (+ IDAPython decryption script) • Including IOCs and Yara rules r136a1.dev/2026/01/14/com…
English
3
86
245
22.1K
MetallicHack retweetou
dis0rder
dis0rder@dis0rder_0x00·
As promised here is my approach to using the Windows Debugging API to inject shellcode (w/o direct process read/write) Had a lot of fun playing with this! (Currently tested agains MDE & Elastic) github.com/dis0rder0x00/D…
dis0rder tweet media
English
7
115
421
38.5K
MetallicHack retweetou
Outflank
Outflank@OutflankNL·
Let's play peekaboo with PatchGuard! Read our blog post about hiding processes on modern Windows systems with HVCI enabled: outflank.nl/blog/2026/01/0…
Outflank tweet media
English
6
126
316
25.5K
MetallicHack retweetou
Kimberly
Kimberly@StopMalvertisin·
Securelist Blog | The HoneyMyte APT evolves with a kernel-mode rootkit and a ToneShell backdoor securelist.com/honeymyte-kern…
English
0
8
29
2.7K
MetallicHack retweetou
Haidar
Haidar@haider_kabibo·
Remember the old Control Panel applets that were used for initial access. I found that these DLLs can be loaded into memory remotely through an interesting DCOM object, allowing to achieve new command execution technique during lateral movement. Details: sud0ru.ghost.io/yet-another-dc…
Haidar tweet media
English
2
35
117
10.3K
MetallicHack retweetou
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
🔥Introducing a new Red Team tool - SessionHop: github.com/3lp4tr0n/Sessi… SessionHop utilizes the IHxHelpPaneServer COM object to hijack specified user sessions. This session hijacking technique is an alternative to remote process injection or dumping LSASS. Kudos to @tiraniddo for first discovering this years ago. Blue Team tip: Look for unusual child processes spawning from HelpPane.exe
English
5
138
396
34K
MetallicHack retweetou
Outflank
Outflank@OutflankNL·
New blog by Outflank’s @KyleAvery: Linux process injection leveraging seccomp to inject shared libraries into Linux processes without LD_PRELOAD, ptrace nor elevated privileges. Parent-to-child injection at any ptrace_scope level 💪😎 Tech details here: ow.ly/KwBh50XGvrC
GIF
English
1
54
152
12.9K
MetallicHack retweetou
sapir federovsky
sapir federovsky@sapirxfed·
My gift for Thanksgiving 💜 I wrote for you the blog post I always wanted to read! Happy holiday!🦃 PLEASE READ IT!!! wiz.io/blog/recent-oa…
English
9
84
239
52.9K
MetallicHack retweetou
Cobalt Strike
Cobalt Strike@_CobaltStrike·
Cobalt Strike 4.12 is LIVE, complete with a new look for the GUI! Additionally, we're introducing: - A REST API - User Defined Command and Control (UDC2) - New process injection options - New UAC bypasses - and more! Check out the release blog for details. ow.ly/RSmE50Xx1OS
Cobalt Strike tweet media
English
4
30
94
45.3K