Kurosh Dabbagh

2K posts

Kurosh Dabbagh

Kurosh Dabbagh

@_Kudaes_

nt authority\kurosh https://t.co/MCEI38ndVE https://t.co/w6aiUt7YlZ

Madrid เข้าร่วม Ocak 2013
194 กำลังติดตาม1.5K ผู้ติดตาม
Kurosh Dabbagh รีทวีตแล้ว
Wietze
Wietze@Wietze·
Can LNK files ever be trusted? ⚡ My latest blog post demonstrates several new LNK abuse methods, allowing you to fully spoof the target shown in Explorer. It also introduces tools to create your own LNKs, and detected spoofed ones yourself. 🐬 wietzebeukema.nl/blog/trust-me-…
English
12
202
939
137.8K
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
Any good reading material on Windows Cache Manager, Memory Manager or I/O handling in general from the kernel's perspective?
English
1
0
1
325
Kurosh Dabbagh รีทวีตแล้ว
X-C3LL
X-C3LL@TheXC3LL·
A small rant: The State of Art in Red Team is whatever you want to believe x-c3ll.github.io/posts/Rant-Red…
English
17
90
345
50.4K
Kurosh Dabbagh รีทวีตแล้ว
Iago Abad
Iago Abad@IagoAbad·
Hi! I just published a technical deep dive into a complex and fun N-day vulnerability that allows to get RCE in a very popular e-commerce platform. Check it out! hiddeninslack.github.io/posts/from-sst…
English
0
9
12
717
Kurosh Dabbagh รีทวีตแล้ว
Inés
Inés@ineesdv·
Tangled is a social engineering platform that weaponizes calendar event processing in Outlook and Gmail to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction. github.com/ineesdv/Tangled Technical breakdown: tarlogic.com/blog/abusing-c…
English
2
45
148
9.2K
Kurosh Dabbagh รีทวีตแล้ว
BlackArrow
BlackArrow@BlackArrowSec·
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: tarlogic.com/blog/abusing-c…
BlackArrow tweet media
English
0
20
21
3K
Kurosh Dabbagh รีทวีตแล้ว
klez
klez@KlezVirus·
[RELEASE] As promised, I’m releasing the first blog post in a series. It covers the gaps still present in current stack-based telemetry and how Moonwalking can be extended to evade detection logic and reach “on-exec” memory encryption. Enjoy ;) klezvirus.github.io/posts/Moonwalk…
English
8
113
343
28.4K
Samy
Samy@Samywithme·
@_Kudaes_ do i need admin priv to retrieve SAM ?
English
1
0
0
217
Kurosh Dabbagh
Kurosh Dabbagh@_Kudaes_·
I just released MFTool, an NTFS parser that builds an in-memory map of a volume, allowing you to: - Read any file without opening a handle - Get the contents of locked/deleted files (registry hives, pagefile.sys, etc) - Perform fast, in-memory searches across the entire disk 🔗👇
English
4
43
174
13.4K
Dodge This Security
Dodge This Security@shotgunner101·
@_Kudaes_ Gonna add this to my list of purple team testing for trying to access the sam hive, etc and see if the EDR blocks me 🫡
English
1
0
6
584
Kurosh Dabbagh รีทวีตแล้ว
Tijme Gommers
Tijme Gommers@tijme·
Exciting times. I'm publishing Dittobytes today after presenting it at @OrangeCon_nl ! Dittobytes is a true metamorphic cross-compiler aimed at evasion. Use Dittobytes to compile your malware. Each compilation produces unique, functional shellcode. github.com/tijme/dittobyt…
English
11
98
257
27.6K
Kurosh Dabbagh รีทวีตแล้ว
krp
krp@_kripteria·
Four months of development and maintenance have yielded considerable results. With the new changes introduced, the old demo was somewhat obsolete, so I decided to upload a new one where you can better see the current improvements to Neo4LDAP. youtube.com/watch?v=f2vkcr…
YouTube video
YouTube
English
1
4
5
1.2K
Kurosh Dabbagh รีทวีตแล้ว
BlackArrow
BlackArrow@BlackArrowSec·
AvePoint has fixed a vulnerability in DocAve, Perimeter and Compliance Guardian discovered by our researchers @m1ntko and @Calvaruga. This vulnerability can be used to achieve Remote Code Execution (RCE) in affected systems. ➡️ Advisory: avepoint.com/company/docave…
BlackArrow tweet media
English
0
8
8
1.4K