Isis (@0x1sis) 's Twitter Profile
Isis

@0x1sis

Malware & Windows enjoyer

ID: 1193241730008723462

linkhttps://isis.red calendar_today09-11-2019 18:59:38

749 Tweet

804 Followers

211 Following

Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

Would a webinar about showcasing UAC bypasses and methodology for finding new ones be interesting for you hackers? Like, comment or RT if any interest.

Nathan Blondel (@slowerzs) 's Twitter Profile Photo

Think HVCI and kCET mean the end of kernel code execution? I wrote a blogpost exploring an alternative way to execute a kernel payload! :) blog.slowerzs.net/posts/keyjumpe…

POC_Crew 👨‍👩‍👦‍👦 (@poc_crew) 's Twitter Profile Photo

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly. 👥 Nabih Benazzouz(Nabih) & Kylian Boulard De Pouqueville(Kylm), “Fuzzing Windows Userland Applications” from FuzzingLabs

#Zer0Con2025 is getting closer, and the training sessions are going very smoothly.

👥 Nabih Benazzouz(<a href="/Raefko/">Nabih</a>) &amp; Kylian Boulard De Pouqueville(<a href="/0xKylm/">Kylm</a>), “Fuzzing Windows Userland Applications” from <a href="/FuzzingLabs/">FuzzingLabs</a>
Jord (@0xlegacyy) 's Twitter Profile Photo

Yearly blog post just dropped: Control Flow Hijacking via Data Pointers 🐸 Showcasing how to find your own in Binary Ninja, how to weaponize and write a shellcode stub etc. Hopefully people find it useful :) legacyy.xyz/defenseevasion…

Leonid Bezvershenko (@bzvr_) 's Twitter Profile Photo

I'm really happy to announce that we've just opened registration for the SAS CTF 2025 qualifying round!⛳️ This year's top 8 teams will qualify for the onsite finals to compete for a share of the $18.000 prize pool at the Security Analyst Summit conference in Khao Lak, Thailand

I'm really happy to announce that we've just opened registration for the SAS CTF 2025 qualifying round!⛳️

This year's top 8 teams will qualify for the onsite finals to compete for a share of the $18.000 prize pool at the Security Analyst Summit conference in Khao Lak, Thailand
nafiez (@zeifan) 's Twitter Profile Photo

A quick writeup on potential security issue of Windows LNK that I reported to MSRC last month. They decided to not fix due to relying on MOTW. In the blog I included the proof of concept. All you have to do is to Right-Click and get Info Disclosure :) zeifan.my/Right-Click-LN…

Atsika (@_atsika) 's Twitter Profile Photo

ProxyBlob is alive ! We’ve open-sourced our stealthy reverse SOCKS proxy over Azure Blob Storage that can help you operate in restricted environments 🔒 🌐 github.com/quarkslab/prox… Blog post for more details right below ⬇️

at0m741 (LLVM fan account) (@at0m741) 's Twitter Profile Photo

Here is an optimized C++ tensor library that I’m working on. (Include General relativity package). It’s header only and can be used with python. Currently working on LLVM/Clang plugin to emit bad use patterns. All SIMDs isa are automated at compile time. github.com/at0m741/Morphe…

Zellic (@zellic_io) 's Twitter Profile Photo

We retrieved every contract on Ethereum. Along the way, we found the exact date when 16,000 unique contracts were deployed (the most in one day), the EOA with the most deployed contracts (2.9M), and much more. This is how we did it.🧵 (Spoiler: It’s 69,788,231 contracts!)

We retrieved every contract on Ethereum.

Along the way, we found the exact date when 16,000 unique contracts were deployed (the most in one day), the EOA with the most deployed contracts (2.9M), and much more.

This is how we did it.🧵

(Spoiler: It’s 69,788,231 contracts!)
Alex (@xaitax) 's Twitter Profile Photo

🔓 Big update! Chrome App-Bound Decryption v0.9 released! 🛡️ Get your Cookies, Passwords, Payments, etc., from Chrome/Edge/Brave. (User-mode, no admin) 👤 Decrypts all user profiles! 📂 Set your own output folder! ✅ Solid Microsoft Edge decryption. 📦 Auto-built x64/ARM64

🔓 Big update! Chrome App-Bound Decryption v0.9 released!

🛡️ Get your Cookies, Passwords, Payments, etc., from Chrome/Edge/Brave. (User-mode, no admin)
👤 Decrypts all user profiles!
📂 Set your own output folder!
✅ Solid Microsoft Edge decryption.
📦 Auto-built x64/ARM64
Laluka@OffenSkill (@thelaluka) 's Twitter Profile Photo

"Le samedi c'est repos" -> Suuuure 🙃 Je sors d'une présentation de l'outil d'Auto Pentest Report -et bien plus en fait tmtc- : Milou ! ➡️ Milou / milou.sh Et... 😱 Bien qu'en early stage, ca envoie du paté !!! Quelques discussions sur les features à

Haidar (@haider_kabibo) 's Twitter Profile Photo

Here is the second part of the Windows IPC series. As planned, I've started with RPC. The third and fourth parts will come soon. sud0ru.ghost.io/windows-inter-…

ö (@r0keb) 's Twitter Profile Photo

Just published a blog post exploring junk code engines used in polymorphic malware. Part one covers ETG by Z0MBiE (32-bit). Part two introduces TrashFormer, my 64-bit implementation. Both fully written in assembly. r0keb.github.io/posts/Junk-Cod…