Hacker Trying to make his name. offensive security consultant at depth security. OSCE | OSCP | OSWE | eCPTXv2 ~ aliases breadman, allevon412

Joined June 2021
This is me in a nutshell
0
0
0
0
Is anyone here good at assembly and wants to help me solve a minor problem?
0
0
0
0
Thanks for the shoutout!
RT @allevon412 New blog post I wrote pertaining to the classic api unhooking methodology. depthsecurity.com/blog/class… #apis #wbdev #appdev #REST
0
0
0
0
We're running a little experiment with the @teachable platform. The C2 Development in C# course is now for sale here, rather than through our main website. Depending on what customer feedback is like, other courses may follow in the future. courses.zeropointsecurity.co…
3
13
0
63
Let’s no longer use man in the middle either, because you know…. Could be a woman on your network…
“As we work to fill open cybersecurity jobs & create a more diverse & inclusive industry that is better able to combat cyber threats, inclusivity, & the intentionality that requires, has to permeate every aspect of the field, including the language.” vice.com/en/article/v7dd3d/w…
0
0
0
1
your holiday being ruined because your wifi bbq needs to do a software update is some real cyberpunk suburban dystopia shit
Hey @TraegerGrills - who the HELL sends a software update on thanksgiving?!?
Show this thread
120
5,141
103
28,879
Show this thread
downloading free version of bitdefender to test payloads against......
1
0
0
0
This article is red team infra gold. Once my interest in malware Dev subsides I’ll have to come back to this.
Hot off the presses: part 2 of making C2 less painful. Modernizing the CIA's approach to offensive Infrastructure by using mesh VPN networks, micro-services and hybrid-cloud deployments. Get your buzzword bingo cards ready. #seo byt3bl33d3r.substack.com/p/t…
0
1
0
0
The Usual Suspects
13
126
8
685
Do it
I've been toying with the idea of creating a new, more modern P/Invoke Wiki with a focus on offensive C# tradecraft. Here's a demo of what it could look like: http://35.177.47.218/en/home What do people think? Useful, waste of time?
0
0
0
0
Man I love your guys artwork. Always so rad.
Total malware samples in the vx-underground malware collection: 3,325,049 Goal: 26,000,000
0
0
0
0
My life motto
"This bread ain't gonna win itself"
0
0
0
0
“As with stomachs, we should pity minds that do not eat.” ~ Victor Hugo
0
12
1
28
I found some private keys on VT, enabling all of us to decrypt C2 traffic from a subset of all the malicious Cobalt Strike servers that are out there on the Internet. More details: "Cobalt Strike: Using Known Private Keys To Decrypt Traffic – Part 1" blog.nviso.eu/2021/10/21/cob…
4
285
13
666
We're back. Did you miss us? New APTs added: - MysterySnail - MirrorBlast - Operation GhostShell You can check it out here: vx-underground.org/ * vx-underground.org is the only domain we now use
10
59
1
202