𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 (@ct_hellcat) 's Twitter Profile
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡

@ct_hellcat

Global Security Team

ID: 713263816868372480

calendar_today25-03-2016 07:18:40

4,4K Tweet

391 Followers

1,1K Following

Nikolaj Schlej (@nikolajschlej) 's Twitter Profile Photo

The embargo (12:00 UTC 2025-06-10) is over, let's start a thread on Hydroph0bia (CVE-2025-4275), a trivial SecureBoot and FW updater signature bypass in almost any Insyde H2O-based UEFI firmware used since 2012 and still in use today. English writeup: coderush.me/hydroph0bia-pa…

Saad AHLA (@d1rkmtr) 's Twitter Profile Photo

You never wonder how malware (like Mimikatz) is statically detected by AV/EDR once dropped to disk! The answer is the Minifilter Pre-Operation callbacks. Each Minifilter has multiple instances of type (`FLT_INSTANCE`, you can have their addresses with !fltkd.filters on Windbg),

Will Schroeder (@harmj0y) 's Twitter Profile Photo

Thank you so much to /ˈziːf-kɒn/ and its organizers for an awesome experience! Lee Chagolla-Christensen and I had a blast talking about the new Nemesis 2.0 rewrite (code live at github.com/SpecterOps/Nem… !) and hope to be back next year #x33fcon

sixtyvividtails (@sixtyvividtails) 's Twitter Profile Photo

Did you know Windows has built-in RAM disk? Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack! That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly! No data persistence; ws22/w11+. EZ 📀 create:

Did you know Windows has built-in RAM disk?
Not just your regular RAM disk. It's pmem/nvdimm, via scmbus.sys built-in hack!

That means you can make 🦆🦆🦆 #dax volume, so data/image mappings (section views) will use "drive" directly!
No data persistence; ws22/w11+. EZ 📀 create:
R.B.C. (@g3tsyst3m) 's Twitter Profile Photo

I'm starting another series - Buffer Overflows in the Modern Era. I'll go over the basics of using a debugger all the way to successfully achieving a buffer overflow exploit on Windows 11 24H2, using ROP gadgets and bypassing ASLR, etc. Here's part 1! g3tsyst3m.github.io/binary%20explo…

N$ (@nav1n0x) 's Twitter Profile Photo

Discovered a cool Windows LFI during a pentest in a widely used tool. This might be a 0-day — I found over 5k+ affected installations. Possibly another CVE in the pipeline. Payload:

Discovered a cool Windows LFI during a pentest in a widely used tool. This might be a 0-day — I found over 5k+ affected installations. Possibly another CVE in the pipeline. 
Payload:
CICADA8Research (@cicada8research) 's Twitter Profile Photo

Read our new article about privilege escalation via SymLinks! You will learn how to abuse arbitrary deletion, copying, overwriting, we will show you a couple of tricks and teach you a new interesting way to bypass UAC :) cicada-8.medium.com/were-going-the…

Pumpkin 🎃 (@u1f383) 's Twitter Profile Photo

A bit late, but I just published my blog post on bypassing Ubuntu’s sandbox! Hope you enjoy it! u1f383.github.io/linux/2025/06/…

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥 github.com/rtecCyberSec/B… No need to steal credentials, no impersonation, no injection needed 👌

K̵i̵r̵k̵ ̵T̵r̵y̵c̵h̵e̵l̵ (@teach2breach) 's Twitter Profile Photo

🔧 Byont: (PoC) Load clean ntdll.dll from Microsoft symbol servers and execute functions from memory. Manual PE loading without LoadLibrary - bypass userland hooks for security research. github.com/Teach2Breach/b…

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

Since several people already asked: the slides from Fabian Bader and myself for TROOPERS Conference are available! "Finding Entra ID CA bypasses-the structured way". We talked about FOCI, BroCI, CA bypasses, scopes and getting tons of tokens. Check it at dirkjanm.io/talks/

Dave Cossa (@g0ldengunsec) 's Twitter Profile Photo

Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence. ibm.com/think/x-force/…

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

Exposing your multi tenant service principal secret to everybody is not just bad security but it’s completely wrong. Great finding by - Sad to see that Synology Inc. handled the disclosure so badly. Use managed identities! modzero.com/en/blog/when-b…

RWXstoned (@rwxstoned) 's Twitter Profile Photo

A helper function to log debug strings at runtime in your UDRL and hopefully make the whole process a bit easier. To use with the CobaltStrike UDRL-VS. rwxstoned.github.io/2025-07-06-Bet…

ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

5pider (@c5pider) 's Twitter Profile Photo

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…

starlabs (@starlabs_sg) 's Twitter Profile Photo

One of our current intern, vincent shared his Chrome-atic escape adventure using CVE-2024-30088 Epic obstacles documented in it too! starlabs.sg/blog/2025/07-f…