Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
132 subscribers
207 photos
14 videos
7 files
625 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Forwarded from club1337
Telegram ✉️ @club1337
X (Twitter) 🕊 @club31337
Please open Telegram to view this post
VIEW IN TELEGRAM
9️⃣1️⃣1️⃣ Driver Reverse Engineering 101 - Part II: Unpacking a VMProtected Boot Driver

#windows_internals #windows_kernel
#import_address_table #reverse_engineering

@ZwLowLevel
https://eversinc33.com/posts/driver-reversing-ii.html
Please open Telegram to view this post
VIEW IN TELEGRAM
This media is not supported in your browser
VIEW IN TELEGRAM
😈 BOF_RunPE

BOF to run PE in Cobalt Strike Beacon without console creation
#cobalt_strike #pe
#c2 #offensive_tool

@ZwLowLevel
https://github.com/NtDallas/BOF_RunPe
Please open Telegram to view this post
VIEW IN TELEGRAM
Low Level CO 🇨🇴 pinned «👌 ETW internals for security research and forensics #windows_internals #windows_telemetry #os_internals #etw @ZwLowLevel https://blog.trailofbits.com/2023/11/22/etw-internals-for-security-research-and-forensics»