![Meelo Profile](https://pbs.twimg.com/profile_images/1010812961638604801/ywga1xhm_x96.jpg)
Meelo
@CaptMeelo
Followers
3K
Following
2K
Statuses
1K
Here's the tool that I demoed during my #SANSHackFest talk. Let's make it better by filing any issues you identified and submitting PRs. #redteam #maldev
7
77
169
RT @lastweekinfosec: CUPS RCE (@evilsocket), driver vulns (@vinopaljiri), NamelessC2 release (@trickster012), liveness detection bypass (@C…
0
8
0
RT @s4ntiago_p: 🔥 New blogpost 🔥 Running PEs inline without a console. You now can, for example, run PowerShell in CobaltStrike and obtain…
0
180
0
RT @AliceCliment: Finally done! My latest article introduce the basics of Windows kernel drivers/internals and how to find and exploit pro…
0
221
0
RT @the_secret_club: Abusing undocumented features to spoof PE section headers by @x86matthew
0
82
0
RT @VirtualAllocEx: With my new blog post "Direct Syscalls: A journey from high to low" I try to explain what a syscall is, what a direct s…
0
146
0
RT @s4ntiago_p: I just published my implementation of call stack spoofing using hardware breakpoints 😁 Works for syscalls and APIs, suppor…
0
88
0
@snovvcrash @carlospolopm @OscarAkaElvis @cube0x0 @HackAndDo @Flangvik @ippsec @0xdf_ @n00py1 @_EthicalChaos_ @_xpn_ @podalirius_ @KlezVirus @tifkin_ @FuzzySec @mariuszbit @Jean_Maes_1994 @tiraniddo @N4k3dTurtl3 @NotMedic @s4ntiago_p @icyguider @x86matthew @ly4k_ @bohops Thanks for including me. It's my pleasure.
0
0
1
RT @snovvcrash: [BLOG 📝] Some notes on how to automate the generation of Position Independent Shellcodes (without msfvenom windows/x64/exec…
0
69
0
RT @Stealthsploit: Finally revamped my original @hashcat rule OneRuleToRuleThemAll. The new and improved OneRuleToRuleThemStill has ~5% re…
0
76
0
RT @0xBoku: macOS x64 shellcode that uses an eggHunter to find and decipher the command shell string. Tinkering with macOS x64 shellcoding…
0
49
0
@vxunderground @_RastaMouse This is a nice re-implementation. :) Just an FYI, my PoC does not spawn certain binaries because of the lack of CSRSS notification. @s4ntiago_p solved this issue in his implementation.
2
2
8
Here's a copy of my slides from my #SANSHackFest talk. Sorry it took me awhile to upload it. #maldev #redteam
0
36
82
RT @KlezVirus: [BLOG POST] And as promised, this is a brief article the describing the technique used within SilentMoonwalk. Might be a goo…
0
121
0
RT @coder_rc: Windows internals resources that I have collected in around an year #infosec Win32 programming with code examples: https://t.…
0
192
0
RT @vxunderground: We have published a paper: "About malware writing and how to start" This paper exists to address the questions we frequ…
0
127
0
RT @KlezVirus: [RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, resul…
0
240
0
RT @binitamshah: laZzzy : a shellcode loader, developed using different open-source libraries, that demonstrates different execution techni…
0
78
0