- 📖 I’m currently working on threat hunting
- 📘 I’m currently learning everything 🤣
- 🎭 I’m looking to explore purple teaming
- ☑️ 2023 Goals: Contribute more to Open Source projects
- Bypass Windows Defender 2024 - Windows Cyber Security
- LSASS Dumping Using DFIR Tools
- Memory Forensics with Volatility | PDF Malware Analysis with Any.Run | Cyber Incident Response
- Methods for Finding Threat Signals - Greg Lesnewich @ NetNoiseCon
- BlueHat Oct 23. S10: Exploring the Windows Registry as a Powerful LPE Attack Surface
- Prompt Injection in LLM Browser Agents
- Hacking Windows Domain Active Directory Series - Episode 02
- JA4+ Intro
- Modern Threat Hunting
- NSEC2023 - Burp Suite Pro tips and tricks, the sequel
- cowbe0x004 starred SigmaPotato
- cowbe0x004 starred TotalRecall
- cowbe0x004 starred msg-extractor
- cowbe0x004 starred FilelessPELoader
- cowbe0x004 starred OffensiveGolang
- cowbe0x004 starred XnlReveal
- cowbe0x004 starred ChromeKatz
- cowbe0x004 starred zgrab2
- cowbe0x004 starred EnableWindowsLogSettings
- cowbe0x004 starred Freeway
- RT Alh4zr3d: Red Teamers: Windows Subsystem for Linux (WSL) is more and more common, especially on dev workstations. Don't neglect it! WSL rev shell: ...
- RT Grzegorz Tworek: Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautif...
- RT Mr. Rc: Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources tha...
- RT Oliver Lyak: Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential G...
- RT Ali Hadi | B!n@ry: Here we go again. Will randomly choose end of Nov. one person to attend the @cyber5w #CCDFA certification LIVE with me starting ...