![Mr. OS Profile](https://pbs.twimg.com/profile_images/862706447020326912/ZiPZWTZ4_x96.jpg)
Mr. OS
@ksg93rd
Followers
2K
Following
263
Statuses
6K
To catch an adversary you have to become one. Always deliver more than expected !!!!!!
Finland
Joined February 2014
#Kernel_Security "SysBumps: Exploiting Speculative Execution in System Calls for Breaking KASLR in macOS for Apple Silicon", 2024. ]->
0
7
25
#Research
#Sec_code_review "TYPEPULSE: Detecting Type Confusion Bugs in Rust Programs", 2025. ]->
0
0
0
#Red_Team_Tactics 1. SiphonDNS: covert data exfiltration via DNS 2. Bypassing WAF with Hex Overflow
0
0
1
#Whitepaper "Evaluating Modern Network Protocol Fingerprinting: Defending Bastion Hosts in Hostile Networks", 2025. ]-> Network Protocol Fingerprinting with HASSH/JA4+SSH -
0
0
1
#Offensive_security 1. form-action Content-Security-Policy Bypass and other tactics for dealing with the CSP 2. Root Detection & SSL Bypass Script 3. Bypass Cloudflare's /h/b/jsd challenge using 100% python
0
0
1
#Malware_analysis 1. BADBOX Botnet 2. Malicious SVG links 3. AiTM/MFA phishing attacks in combination with "new" Microsoft protections
0
1
2
#tools
#Malware_analysis "ClarAVy: A Tool for Scalable and Accurate Malware Family Labeling", 2025. ]->
0
0
0
#Blue_Team_Techniques "Rule-ATT&CK Mapper (RAM): Mapping SIEM Rules to TTPs Using LLMs", 2025. ]->
0
0
0
#Threat_Research 1. HTB: Trickster (CVE-2024-34716, CVE-2024-32651) 2. Windows Sockets: From Registered I/O to SYSTEM Privileges (CVE-2024-38193)
0
0
0
#WebApp_Security
#Red_Team_Tactics Top 10 web hacking techniques of 2024 ]-> Top 10 Web Hacking Techniques 2007-2023 -
0
0
0
#Whitepaper
#Threat_Research "Security considerations for edge devices (ITSM.80.101)", 2025. ]-> Digital forensics and protective monitoring specifications for producers of network devices and appliances - ]-> Mitigation strategies for edge devices: Executive guidance - ]-> Mitigation strategies for edge devices: Practitioner guidance -
0
0
1
#tools
#Blue_Team_Techniques 1. CortexCanary - Tooling related to discovery of Cortex XDR canary files to avoid 2. YaraMonitor - tool to continuously ingest, analyze, and alert on malware samples given a set of yara rules
0
0
1