Previous page Next page

iEmoji Feeds @BenHeise (benheise)

1.

benheise
BenHeise @benheise
[Tooling ] Updated DInjector with 'RemoteThreadKernelCB' technique for shellcode invocation by spoofing the fnCOP… twitter.com/i/web/status/1…
Retweet of status by @snovvcrash
12 Jan 22 copy & paste +upvote -downvote [Tooling ⚔️] Updated DInjector with 'RemoteThreadKernelCB' technique for shellcode invocation by spoofing the fnCOP… https://t.co/LLHfkcb2KQ

2.

benheise
BenHeise @benheise
Updated the reflective loader to work with Cobalt Strike v4.5! Only took ~25 hours and 3 rebuilds to find the bug
github.com/boku7/BokuLoad…
Retweet of status by @0xBoku
31 Dec 21 copy & paste +upvote -downvote Updated the reflective loader to work with Cobalt Strike v4.5! Only took ~25 hours and 3 rebuilds to find the bug 😅 https://t.co/At0dcvYZF0
3.
benheise
BenHeise @benheise
18 Nov 21 copy & paste +upvote -downvote Yikes.😬 https://t.co/aZ5ImSOAKk
4.
benheise
BenHeise @benheise
@j0nh4t @Razer I just tried spoofing the vendor id to 0x1532 and product id to 0x0084 and it works great
Retweet of status by @_tmap
21 Aug 21 copy & paste +upvote -downvote @j0nh4t @Razer I just tried spoofing the vendor id to 0x1532 and product id to 0x0084 and it works great 👍
5.
benheise
BenHeise @benheise
It's not Anxiety unless its from the Anxiety region of France, otherwise it's just Sparkling Stress
06 Jul 21 copy & paste +upvote -downvote It's not Anxiety unless its from the Anxiety region of France, otherwise it's just ✨🌟Sparkling Stress 🌟✨
6.
benheise
BenHeise @benheise
New blog post!

Following the release of "Perfusion", my exploit tool for the RpcEptMapper registry key vulnerabi… twitter.com/i/web/status/1…
Retweet of status by @itm4n
21 Feb 21 copy & paste +upvote -downvote New blog post! 🤓 Following the release of "Perfusion", my exploit tool for the RpcEptMapper registry key vulnerabi… https://t.co/TZDPVJyKRm
7.
benheise
BenHeise @benheise
Bye-bye botnets Huge global operation brings down the world's most dangerous malware.

Investigators have taken co… twitter.com/i/web/status/1…
Retweet of status by @Europol
27 Jan 21 copy & paste +upvote -downvote Bye-bye botnets👋 Huge global operation brings down the world's most dangerous malware. Investigators have taken co… https://t.co/WHP6dYnf94
8.
benheise
BenHeise @benheise
Nice. Super simple to combine Nim DLLs with sRDI for shellcode injection
Retweet of status by @ajpc500
15 Jan 21 copy & paste +upvote -downvote Nice. Super simple to combine Nim DLLs with sRDI for shellcode injection🐚 https://t.co/M1yUsVRSBx
9.
benheise
BenHeise @benheise
lsassy v3.0.0 𝗯𝗲𝘁𝗮 available for testing
️If you want to try it out, feel free to report any bug you find
* Rewr… twitter.com/i/web/status/1…
Retweet of status by @HackAndDo
25 Aug 20 copy & paste +upvote -downvote 🔥 lsassy v3.0.0 𝗯𝗲𝘁𝗮 available for testing 🏗️If you want to try it out, feel free to report any bug you find * Rewr… https://t.co/jCXmsP6WaS
10.
benheise
BenHeise @benheise
Really excited about this integration:

Use C3, Donut, and Covenant together seamlessly

twitter.com/FSecureLabs/st…
Retweet of status by @cobbr_io
10 Mar 20 copy & paste +upvote -downvote Really excited about this integration: Use C3, Donut, and Covenant together seamlessly 🔥🔥🔥 https://t.co/zYkhMPVRGI
11.
benheise
B⬡nH⬡is⬡ @benheise
\\live.sysinternals.com\tools\notmyfaultc64.exe /accepteula bugcheck 0x37

You are welcome
Retweet of status by @0gtweet
14 Feb 20 copy & paste +upvote -downvote \\https://t.co/1FtqpjbG0c\tools\notmyfaultc64.exe /accepteula bugcheck 0x37 You are welcome 😎 https://t.co/Au17MKkT3b

...but wait! There's more!

1.

fakhright
fakhright @fakhright
astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat*
14 Jan 13 copy & paste +upvote -downvote astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat* 🙈🙈🙊
Previous page Next page
https://www.iemoji.com/feed/benheise
Back to top