
Ellis Springe
@knavesec
Adversary Simulation X-Force Red, developer of tools, connoisseur of dogs
ID: 1156641971148132357
31-07-2019 19:05:10
229 Tweet
1,1K Followers
399 Following



Video demo of bypassing Windows Defender App Control with Loki C2! Blog with details coming in 1-2 weeks. Yes -- Dylan Tran and I created an entire C2 in JavaScript and it bypasses all the things 🥷🧙♂️🪄

Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to Dylan Tran and chompie for all their contributions to Loki C2! IBM IBM Security X-Force securityintelligence.com/x-force/bypass…





As promised... this is Loki Command & Control! Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

I Backdoored Cursor AI 😎 youtu.be/FYok3diZY78 Finally getting a chance to play with Loki C2, the super cool Node JS C2 framework for backdooring Electron applications (think Discord, Slack, too!) -- put together by the incredible Bobby Cooke 🔥We even got to nerd out over DMs to




I am thrilled to be presenting new research on attacking ML training infrastructure at TROOPERS Conference this summer. Stay tuned for a blog post and lots of updates to MLOKit closer to the conference!





New research just dropped I'll be presenting at TROOPERS Conference next week - Attacking ML Training Infrastructure 💥 Model poisoning for code execution ⚠️ Abusing ML workflows ⚙️ MLOKit updates and new threat hunting rules ibm.com/think/x-force/…

