L

778 posts

L

L

@x86shell

شامل ہوئے Şubat 2015
499 فالونگ1.7K فالوورز
L
L@x86shell·
poking this 70f with a stick for its secrets
L tweet media
English
0
0
1
165
L
L@x86shell·
@IzzyBoopFPV Awesome writeup!
English
0
0
1
85
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
If I’m copilot and ur copilot then who’s flying this plane
English
58
12
268
11.1K
L
L@x86shell·
@UK_Daniel_Card Even worse if the account you're using needs PIM for Sec admin, elements popping in and out as the page loads, random data not being available etc.
English
1
0
4
74
mRr3b00t
mRr3b00t@UK_Daniel_Card·
With defender XDR i nearly took a screenshot of the XDR interface and could have put big red rectangles everywhere that wastes space in the GUI. I would be left with most of the page in red 😂 (exaggerating slightly) Isn’t just me that thinks they have made security for Microsoft insanely bad from a UI / UX pov?
English
11
0
26
2.4K
L ری ٹویٹ کیا
RussianPanda 🐼 🇺🇦
RussianPanda 🐼 🇺🇦@RussianPanda9xx·
NEW BLOG: The Great VM Escape 💕 We caught threat actors deploying a VMware ESXi exploit toolkit in the wild - potentially was a zero-day developed over a year before VMware's disclosure 👀 If anyone has thoughts on it let me know, but I needed almost a full case of beer to wrap my head around this one 🍺 Full technical breakdown 👇 huntress.com/blog/esxi-vm-e…
English
26
192
784
168.4K
L
L@x86shell·
@5mukx Some really cool techniques here dude :)
English
0
0
0
152
Smukx.E
Smukx.E@5mukx·
One Last Update. My Malware development works and practices [2025 The End]: Shellcode execution methods :- * CertEnumSystemStore: github.com/Whitecat18/Rus… * CDefFolderMenu_Create2: github.com/Whitecat18/Rus… * CertEnumSystemStoreLocation: github.com/Whitecat18/Rus… * CopyFileExW: github.com/Whitecat18/Rus… * CreateThreadPoolWait: github.com/Whitecat18/Rus… * VectoredOverloading: github.com/Whitecat18/Rus… * LdrEnumerateLoadedModules: github.com/Whitecat18/Rus… * RtlUserFiberStart: github.com/Whitecat18/Rus… Other Updates :- Telegram operator [Run Binary Files & Exec commands]: github.com/Whitecat18/Rus… EarlyCascade Injection [Update with stealthy stubs]: github.com/Whitecat18/Rus… ApiParser [parses PEB and resolves API addresses using hashes at runtime]: github.com/Whitecat18/api… AMSI Update, Added another Method Page Guard exception: github.com/Whitecat18/Rus… Custom Exception Handlers [Use your own CEH to bypass EDR hooks PoC]: github.com/Whitecat18/Rus… Proxy DLL Load: github.com/Whitecat18/Rus… And more ......... For more info please visit the repository: github.com/Whitecat18/Rus…
English
2
37
166
7.4K
vx-underground
vx-underground@vxunderground·
Giveaway next. This is a correction post. I am very tired and misunderstood the sponsors message to me. Sorry. @chaeynz_ is sponsoring a 1 year subscription to Mullvad VPN. Leave a comment below for a chance to win.
English
593
29
673
44.9K
L ری ٹویٹ کیا
The Hacker News
The Hacker News@TheHackersNews·
🚨 Hackers are using a fixed Windows bug (CVE-2025-59287) to spread ShadowPad malware through WSUS servers. They used normal Windows tools like curl and certutil to install it — a method seen before in Chinese hacking groups. Systems patched too late may have already been compromised. Full story ↓ thehackernews.com/2025/11/shadow…
The Hacker News tweet media
English
4
145
401
96.5K
L
L@x86shell·
@RussianPanda9xx @malcat4ever I bought Malcat about a year ago, still my first go to tool plus it's a steal for the price
English
0
0
1
42
L
L@x86shell·
@UK_Daniel_Card I tried building something like this in ThreeJS a while ago but it got super complicated quickly as I wanted to live stream attack data without it being filled with slop indicators
English
0
0
1
65
mRr3b00t
mRr3b00t@UK_Daniel_Card·
Working on a thing......
mRr3b00t tweet media
English
5
1
16
1.5K
L ری ٹویٹ کیا
Purz.ai
Purz.ai@PurzBeats·
Purz.ai tweet media
QME
11
3
178
11.9K
L
L@x86shell·
@IceSolst Do they stock material reference fortinet 0days?
English
0
0
1
91
L
L@x86shell·
@UK_Daniel_Card We noticed some OpSec whoopsies with C2's on Lumma - I've not looked into Rhad too much but wondering the same technique might work
English
0
0
1
58
mRr3b00t
mRr3b00t@UK_Daniel_Card·
I wonder if this is any good....
mRr3b00t tweet media
English
2
0
7
1.2K
L
L@x86shell·
@vxunderground Had a look for UK domains, looks like a WP plugin called "formidable" is being used to stage the PDFs. CVE-2022-29622 maybe?
L tweet media
English
0
2
24
1.6K
vx-underground
vx-underground@vxunderground·
Massive shout-out to the local governments of New York, Hawaii, Louisiana, and the homies at the Supreme Court of California. It's 2025 and they're helping people get FREE ROBUX
vx-underground tweet mediavx-underground tweet media
English
26
75
1.2K
61.5K
L
L@x86shell·
@wbmmfq It's giving me major LLM generated code vibes
English
1
0
1
34
Tanner
Tanner@wbmmfq·
Doing a bit of hunting on @ValidinLLC, let's see where I can get! Looks like the IP address of the site a few days ago was 101.99.92[.]246. There are a number of other domains associated with this IP, as well:
vx-underground@vxunderground

Mr. Manley was kind enough to share the DMCA takedown notice he received. He indicated in the attached post that he believed it to be malicious (a scam of some sort) and his assumptions were correct. I only briefly skimmed the malware he sent me because I'm very sleepy, but from a high level overview this "DMCA takedown" is very silly. The DMCA takedown website generates a "password" to review the DMCA takedown report. This is made to masquerade and/or mimic legitimate legal documents which may password protect PDF files which may contain sensitive data. When you click download report, the DMCA report is a .exe file which pulls from a disposable GitHub profile. The .exe file when executed has a standard GUI. It opens, it sits there, it looks pretty. The .exe stops execution until you provide the "password" which was generated from the DMCA takedown website. I have not performed testing to determine if the "password" is uniquely generated each time or if it's static. I'm going to assume it's static because that's the easier option and they're probably lazy. Anyway, until that "password" is provided nothing happens. The binary itself has some cool stuff. While I only briefly skimmed over it, it is interesting that it was compiled using Visual Studio and the Manifest file is written in Cyrillic. That is totally normal (no, it's not). While not always hard evidence, the Manifest file being in Cyrillic is an indicator that the authors are probably from Russia, Ukraine, Kazakhstan, or some other country in the Commonwealth of Independent States (ex-Soviet). In other words, whoever wrote this program is running Windows with the Russian language pack set to default (their computer is in Russian). Cool. The binary also invokes UAC when it runs (wants to run as Admin). All of this is designed to trick the user who has executed the file into believing this is a legitimate DMCA takedown request and this .exe will contain sensitive legal information. When you actually enter the "password" which is provided, the DMCA takedown .exe does some interesting things which are totally normal (no, it's not) For example: - Invokes Powershell - Excludes a bunch of .exe files from Windows Defender - Downloads some other .exe files This is where I stopped because it's bed time. Some of the files downloaded look like "hack" tools. One of them is named "Index.exe". But I'm not sure. I'll keep poking it with a stick when I wake up. I'm curious what this actually delivers. I'm impressed by how far and targeted this is to YouTubers (assuming it has been sent to other YouTubers). The amount of tailoring is probably 40, maybe 50, minutes of work with a fake domain name, shit web hosting, and ChatGPT slop website. This is far more effort than what you typically see with shit slop malware campaigns. I'm curious if it delivers an existing information stealer payload, a custom made information stealer payload, ... does it deploy ransomware? I don't know! Find out next time on Dragon Ball Z

English
2
3
26
11K
L
L@x86shell·
@UK_Daniel_Card Never personally seen a proc hollow on Defender binaries before, I've got samples to RE next week as the dropper was pretty sophisticated
English
2
0
2
851
mRr3b00t
mRr3b00t@UK_Daniel_Card·
@x86rax oooh interesting!
English
1
0
1
869
L
L@x86shell·
First exploitation of CVE-2025-59287 this week. Cmd -> ps -> curl -> 7z self extracting archive -> Proc Hollow MsMpEng -> (Suspected Cobalt Strike) C2. All binaries/IP Addrs FUD.
English
3
6
95
20.4K
L
L@x86shell·
@UK_Daniel_Card @Clarkee Most of my internet facing apps run via this, excellent feature especially with CF's zero trust
English
2
0
2
251
mRr3b00t
mRr3b00t@UK_Daniel_Card·
I saw a post from @Clarkee on having a zero internet exposure web server using CloudFlare tunnels so I thought I'd give it a go!
mRr3b00t tweet media
English
8
0
32
5K