Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
121 subscribers
178 photos
10 videos
7 files
542 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
AV/EDR Killer

AV/EDR Killer by exploiting Signed Microsoft driver.

#offensive_tool
@ZwLowLevel
https://github.com/SaadAhla/Killer
💯 We're starting another new week. I hope everyone achieves their goals.
Low Level CO 🇨🇴 pinned «SheepCrypter - Ghostly Hollowing Crypter Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum stealth. #malwaredev #maldev #malware_development @ZwLowLevel https://git…»
API Hooking – Tales from a Hacker’s Hook Book

This is called Hooking—the process by which an application intercepts an API call between two other applications. In the example above, the intercepting function (called a hook procedure) altered the data passed onto the recipient (the text editor), but that is not always the case.

#windows_internals
#api_hooking
#inline_hooking

@ZwLowLevel
https://www.cynet.com/attack-techniques-hands-on/api-hooking/
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey

🔗 Link

#exploitation
#synology
#pwn2own
———
🆔 @Infosec_Fortress
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves

#os_internals
@ZwLowLevel

https://arxiv.org/pdf/2510.09272
Low Level CO 🇨🇴 pinned «Malware Just Got Its Free Passes Back! Moonwalk++ Bypasses EDR by Spoofing Windows Call Stacks #malware_development #edr_bypass #edr_evasion #maldev #malwaredev @ZwLowLevel https://klezvirus.github.io/posts/Moonwalk-plus-plus/»