eleven red pandas

45.2K posts

eleven red pandas banner
eleven red pandas

eleven red pandas

@bytecodevm

Hey @bytecodevm (eleven red pandas 🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼🐼), got any spicy bytecode / VM / language implementation / JIT / music

Bagnes, Switzerland Sumali Kasım 2010
818 Sinusundan1.8K Mga Tagasunod
eleven red pandas nag-retweet
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
13
63
4.4K
eleven red pandas
eleven red pandas@bytecodevm·
The article analyzes the macOS secure boot chain on Apple Silicon, showing how Boot ROM, cryptographic verification, Secure Enclave, and staged bootloaders create a hardware-anchored chain-of-trust that protects the OS from power-on to kernel startup. core-jmp.org/2026/03/bootin…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
0
34
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces BYOUD, a Windows evasion technique that manipulates unwind metadata to spoof call stacks without altering return addresses, allowing malware to bypass EDR stack inspection and appear as legitimate execution. core-jmp.org/2026/03/invisi…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
4
6
174
eleven red pandas nag-retweet
Hermes Tool
Hermes Tool@Hermes_tooll·
tool that bypasses iOS SSL Pinning using OpenVPN + iptables — works with Burp Suite & mitmproxy out of the box. 👇 GitHub github.com/SahilH4ck4you/…
English
1
16
127
7.1K
eleven red pandas
eleven red pandas@bytecodevm·
The article explains Microsoft’s ODR mechanism for native MCP registration, enabling AI agents to discover and invoke system tools through the Model Context Protocol, preparing Windows for secure agent-driven workflows and integrations. core-jmp.org/2026/03/odr-in…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
4
104
eleven red pandas nag-retweet
VLadimiR
VLadimiR@Dz10Chiheb·
CVE-2026-25769 - Remote Code Execution via Insecure Deserialization in Wazuh Cluster github.com/hakaioffsec/CV…
Română
0
29
114
8.6K
eleven red pandas
eleven red pandas@bytecodevm·
The article demonstrates how to bypass the Winsock layer by communicating directly with the Windows AFD driver using Native API calls. It explains how socket operations can be replicated via IOCTLs and how this reduces reliance on standard networking APIs. core-jmp.org/2026/03/nt-afd…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
14
41
1.6K
eleven red pandas
eleven red pandas@bytecodevm·
CVE-2025-41245 / CVE-2026-22721 VMware Aria Operations that enable credential disclosure and privilege escalation. Attackers with limited access can escalate privileges and gain administrative control over the infrastructure monitoring platform. core-jmp.org/2026/03/vulner…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
0
226
eleven red pandas
eleven red pandas@bytecodevm·
The article analyzes the Windows GetProcessHandleFromHwnd API and its evolution from a hook-based implementation to a kernel Win32k function that could open powerful process handles, enabling security bypasses such as CVE-2023-41772. core-jmp.org/2026/03/a-deep…
eleven red pandas tweet media
English
0
0
3
152
eleven red pandas nag-retweet
Dimitri Fourny
Dimitri Fourny@DimitriFourny·
From virtio-snd 0-Day to Hypervisor Escape: Exploiting QEMU with an Uncontrolled Heap Overflow - osec.io/blog/2026-03-1…
English
0
7
35
1.6K
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces Windows kernel exploitation and explains how to build a research lab using tools like WinDbg and the HackSys Extreme Vulnerable Driver (HEVD) to study kernel vulnerabilities and exploit development. core-jmp.org/2026/03/0x00-i…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
5
192
eleven red pandas
eleven red pandas@bytecodevm·
The article demonstrates how to hook COM methods in Windows Subsystem for Linux by leveraging C++ RTTI metadata to reconstruct class layouts and locate virtual methods, enabling precise COM instrumentation without symbols. core-jmp.org/2026/03/wsl-co…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
7
23
1.6K
eleven red pandas nag-retweet
blackorbird
blackorbird@blackorbird·
Extract Windows credentials directly from VM memory snapshots and virtual disks github.com/nikaiw/VMkatz
blackorbird tweet mediablackorbird tweet media
English
0
13
46
3.8K
eleven red pandas
eleven red pandas@bytecodevm·
The article introduces LOLExfil, a Living-Off-the-Land data exfiltration technique that abuses legitimate system tools and trusted services to stealthily extract data, blending malicious activity with normal system behavior. core-jmp.org/2026/03/lolexf…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
0
4
195