CaptMeelo Profile Banner
Meelo Profile
Meelo

@CaptMeelo

Followers
3K
Following
2K
Statuses
1K

Lifelong learner.

Joined June 2018
Don't wanna be here? Send us removal request.
@CaptMeelo
Meelo
2 years
Here's the tool that I demoed during my #SANSHackFest talk. Let's make it better by filing any issues you identified and submitting PRs. #redteam #maldev
7
77
169
@CaptMeelo
Meelo
4 months
RT @lastweekinfosec: CUPS RCE (@evilsocket), driver vulns (@vinopaljiri), NamelessC2 release (@trickster012), liveness detection bypass (@C
0
8
0
@CaptMeelo
Meelo
1 year
RT @s4ntiago_p: 🔥 New blogpost 🔥 Running PEs inline without a console. You now can, for example, run PowerShell in CobaltStrike and obtain…
0
180
0
@CaptMeelo
Meelo
2 years
RT @AliceCliment: Finally done! My latest article introduce the basics of Windows kernel drivers/internals and how to find and exploit pro…
0
221
0
@CaptMeelo
Meelo
2 years
RT @the_secret_club: Abusing undocumented features to spoof PE section headers by @x86matthew
0
82
0
@CaptMeelo
Meelo
2 years
RT @VirtualAllocEx: With my new blog post "Direct Syscalls: A journey from high to low" I try to explain what a syscall is, what a direct s…
0
146
0
@CaptMeelo
Meelo
2 years
RT @s4ntiago_p: I just published my implementation of call stack spoofing using hardware breakpoints 😁 Works for syscalls and APIs, suppor…
0
88
0
@CaptMeelo
Meelo
2 years
RT @mrd0x: For the past couple of months @NUL0x4C and I have been working on a module-based malware dev training course that covers variou…
0
158
0
@CaptMeelo
Meelo
2 years
RT @snovvcrash: [BLOG 📝] Some notes on how to automate the generation of Position Independent Shellcodes (without msfvenom windows/x64/exec…
0
69
0
@CaptMeelo
Meelo
2 years
RT @joehowwolf: My first blog at CS - Dynamically spoofing call stacks with timers: PoC:
0
126
0
@CaptMeelo
Meelo
2 years
RT @Stealthsploit: Finally revamped my original @hashcat rule OneRuleToRuleThemAll. The new and improved OneRuleToRuleThemStill has ~5% re…
0
76
0
@CaptMeelo
Meelo
2 years
RT @0xBoku: macOS x64 shellcode that uses an eggHunter to find and decipher the command shell string. Tinkering with macOS x64 shellcoding…
0
49
0
@CaptMeelo
Meelo
2 years
@vxunderground @_RastaMouse This is a nice re-implementation. :) Just an FYI, my PoC does not spawn certain binaries because of the lack of CSRSS notification. @s4ntiago_p solved this issue in his implementation.
2
2
8
@CaptMeelo
Meelo
2 years
Here's a copy of my slides from my #SANSHackFest talk. Sorry it took me awhile to upload it. #maldev #redteam
0
36
82
@CaptMeelo
Meelo
2 years
RT @KlezVirus: [BLOG POST] And as promised, this is a brief article the describing the technique used within SilentMoonwalk. Might be a goo…
0
121
0
@CaptMeelo
Meelo
2 years
RT @coder_rc: Windows internals resources that I have collected in around an year #infosec Win32 programming with code examples: https://t.…
0
192
0
@CaptMeelo
Meelo
2 years
RT @vxunderground: We have published a paper: "About malware writing and how to start" This paper exists to address the questions we frequ…
0
127
0
@CaptMeelo
Meelo
2 years
RT @KlezVirus: [RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, resul…
0
240
0
@CaptMeelo
Meelo
2 years
RT @zeropointsecltd: [NEW SHORT COURSE] DevOps for Pentesters
0
41
0
@CaptMeelo
Meelo
2 years
RT @binitamshah: laZzzy : a shellcode loader, developed using different open-source libraries, that demonstrates different execution techni…
0
78
0