Clement Rouault (@hakril) 's Twitter Profile
Clement Rouault

@hakril

Python (ab)user / Security / Windows internals / @ExaTrack

ID: 606437156

linkhttps://exatrack.com/ calendar_today12-06-2012 16:19:19

461 Tweet

1,1K Followers

534 Following

REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

It's a full win! During the first day of #Pwn2Own Vancouver 2024, we demonstrated a fullchain exploit that escaped from an Oracle Virtualbox's virtual machine, followed by a local elevation of privilege on the Windows 11 host!

It's a full win! During the first day of #Pwn2Own Vancouver 2024, we demonstrated a fullchain exploit that escaped from an Oracle Virtualbox's virtual machine, followed by a local elevation of privilege on the Windows 11 host!
James Forshaw (@tiraniddo) 's Twitter Profile Photo

Just because you get access denied accessing a folder, it doesn't mean you can't get access. A quick look at bypassing the security on the WindowsApps folder. tiraniddo.dev/2024/06/workin…

Clement Rouault (@hakril) 's Twitter Profile Photo

After nearly 10 years of existence, years of use in production on 10k+ computers. The new PythonForWindows release is 1.0.0 \o/ This release adds three important things: official python 3 support, full Unicode support for py2/py3 & CI testing on GitHub ! github.com/hakril/PythonF…

LE BERRE Stéfan (@heurs) 's Twitter Profile Photo

Kdrill, an open source tool to check if your kernel is rootkited🔥 A python tool to analyze memory dumps AND live kernel. No dep, py2/3, no symbols 💪 It rebuild on the fly kernel structs and check suspicious modifications (and if patchguard is running 👀) github.com/ExaTrack/Kdrill

Clement Rouault (@hakril) 's Twitter Profile Photo

In our search for new forensic artifacts at ExaTrack, we sometimes deep dive into Windows Internals. This one is about COM and interacting with remote objects using a custom python LRPC Client. STUBborn: Activate and call DCOM objects without proxy: blog.exatrack.com/STUBborn/

watchTowr (@watchtowrcyber) 's Twitter Profile Photo

in today's 'no way, is it real?' we found out that Palo Alto's PAN-OS CVE-2024-0012 and CVE-2024-9474 were the equivalents of saying 'turn off auth and give me a shell'. Enjoy! labs.watchtowr.com/pots-and-pans-…

Petr Beneš (@petrbenes) 's Twitter Profile Photo

After 6 years, I made a blog thingy again. This time about MmScrubMemory. An innocuous looking function that has bitten my ass several times in the last several years. And if you're developing a hypervisor, it might've bitten yours, too. wbenny.github.io/2024-11-21-mms…

ExaTrack (@exatrack) 's Twitter Profile Photo

3+ YEARS of stealth! We uncovered new tactics used by the perfctl malware, including a userland rootkit & an SSH backdoor (a single SPACE in /etc/passwd!). More insights: blog.exatrack.com/Perfctl-using-… #cybersecurity #threat_hunting #linux #infosec #perfctl #rootkit #ssh #exatrack

Clement Rouault (@hakril) 's Twitter Profile Photo

I wanted to know how WMI Win32_OperatingSystem.Caption get the correct Version number (ex: "Microsoft Windows 11 Pro"). Turns out it's a DLL export: winbrand!BrandingLoadString. And there is a patent for that : patentimages.storage.googleapis.com/94/ab/cb/7c1f5…

Colin Finck (@colinfinck) 's Twitter Profile Photo

The second part of my #WinDbg deep-dive into the #Windows #bootloader is up: Get ready for a decades-old registry structure, unique sorting algorithms, and lots of corner cases. The result is a modern Rust replacement for Mark Russinovich's LoadOrder tool: colinfinck.de/posts/nt-load-…

The second part of my #WinDbg deep-dive into the #Windows #bootloader is up: Get ready for a decades-old registry structure, unique sorting algorithms, and lots of corner cases. The result is a modern Rust replacement for Mark Russinovich's LoadOrder tool: colinfinck.de/posts/nt-load-…
REverse_Tactics (@reverse_tactics) 's Twitter Profile Photo

For the first time, our training "Bug Hunting in Hypervisors" is open to the public at REcon ! Designed for security researchers,we will dive into VM escapes, hypervisor attack surfaces, and real-world exploitation. More info: recon.cx/2025/trainingB…

Nauseam (@chadnauseam) 's Twitter Profile Photo

"A calculator app? Anyone could make that." Not true. A calculator should show you the result of the mathematical expression you entered. That's much, much harder than it sounds. What I'm about to tell you is the greatest calculator app development story ever told.

"A calculator app? Anyone could make that."

Not true.

A calculator should show you the result of the mathematical expression you entered. That's much, much harder than it sounds.

What I'm about to tell you is the greatest calculator app development story ever told.
Erik Pistelli (@erikpistelli) 's Twitter Profile Photo

🚨 WARNING: A fake domain—cff-explorer[.]com—has been registered to distribute malware. It currently appears as the top Google result when searching for "CFF Explorer". The only legitimate domain is ntcore.com.

LE BERRE Stéfan (@heurs) 's Twitter Profile Photo

🚀 Take your malware analysis skills to the next level with Exalyze Discover our unique capabilities to compare malware code with our entire database, identifying similar samples and uncovering hidden connections. 👉 exalyze.io Exalyze