Grzegorz Tworek (@0gtweet) 's Twitter Profile
Grzegorz Tworek

@0gtweet

My own research, unless stated otherwise. Not necessarily "safe when taken as directed".
GIT d- s+: a+ C++++ !U !L !M w++++$ b++++ G-

ID: 564509485

linkhttps://github.com/gtworek calendar_today27-04-2012 11:14:50

6,6K Tweet

34,34K Followers

1,1K Following

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Windows Server riddle anyone? If you configure the Centralized Certificate Store for IIS, PFX files are periodically polled. 1. How often? 2. How to change the interval? Good luck! :)

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Am I an influencer? Who knows! But you can expect three tweets about the BenQ #ScreenBarPro soon. 😄 A couple of weeks ago, BenQ Lighting EU reached out to see if I wanted to review their product. My workspace isn't ideal - I don't have a typical desk lamp, and neither my key

Am I an influencer? Who knows! But you can expect three tweets about the BenQ #ScreenBarPro soon. 😄
A couple of weeks ago, <a href="/benqlighting_eu/">BenQ Lighting EU</a> reached out to see if I wanted to review their product. My workspace isn't ideal - I don't have a typical desk lamp, and neither my key
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

I am happy to announce JonMon2.0 has been published. 2.0 offers a lot of feature updates, as well as stability. More features still to come as time goes on. Enjoy and let me know if you have any issues or questions. Link: github.com/jsecurity101/J…

I am happy to announce JonMon2.0 has been published. 

2.0 offers a lot of feature updates, as well as stability. More features still to come as time goes on. Enjoy and let me know if you have any issues or questions. 

Link: github.com/jsecurity101/J…
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Am I an influencer? Still no idea, but it’s high time for the second tweet about the BenQ #ScreenBarPro I have obtained from BenQ Lighting EU some time ago. I have installed it of course, and the first experience was great. I would never suppose I can write it, but I really love

Am I an influencer? Still no idea, but it’s high time for the second tweet about the BenQ #ScreenBarPro I have obtained from <a href="/benqlighting_eu/">BenQ Lighting EU</a> some time ago.
I have installed it of course, and the first experience was great. I would never suppose I can write it, but I really love
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Is your window stuck outside of visible area of the desktop? Happened again a moment ago and it's always a good reason to share the tip: Alt+Space -> M -> Arrow key and move your mouse. Or bring all windows back with a simple piece of PowerShell: github.com/gtworek/PSBits… And

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Stealing a password from a process trying to launch a child process as a different user? Sure, it's easy when you spot CreateProcessWithLogonW() and then observe where the R8 points to. Enjoy the short video showing all the steps you need to take: youtu.be/pubsrWBHsZM

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

After my latest newsletter issue, diversenok reached out to me with an interesting observation: a password can be encrypted and still functions identically to a cleartext one in CreateProcessWithLogonW(). 😮 This brought up two intriguing questions: 1. How can I decrypt

After my latest newsletter issue, <a href="/diversenok_zero/">diversenok</a> reached out to me with an interesting observation: a password can be encrypted and still functions identically to a cleartext one in CreateProcessWithLogonW(). 😮

This brought up two intriguing questions:
1. How can I decrypt
Wietze (@wietze) 's Twitter Profile Photo

By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections. My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees. Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassing…

By making minor changes to command-line arguments, it is possible to bypass EDR/AV detections.

My research, comprising ~70 Windows executables, found that all of them were vulnerable to this, to varying degrees.

Here’s what I found and why it matters 👉 wietze.github.io/blog/bypassing…
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Are you feeling playful? Show courage! "pssuspend.exe services.exe" Effects are quite weird as any access to SCM/services ends with an indefinite waiting (a.k.a. hang) and no one really knows when and why expect such access in a live system.

Are you feeling playful? Show courage! 
"pssuspend.exe services.exe"
Effects are quite weird as any access to SCM/services ends with an indefinite waiting (a.k.a. hang) and no one really knows when and why expect such access in a live system.
sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Did you know Windows has built-in RAM disk? Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack! That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly! No data persistence; ws22/w11+. EZ 📀 create:

Did you know Windows has built-in RAM disk?
Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack!

That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly!
No data persistence; ws22/w11+. EZ 📀 create: