Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
118 subscribers
174 photos
10 videos
7 files
530 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Low Level CO 🇨🇴 pinned «SheepCrypter - Ghostly Hollowing Crypter Advanced in-memory process injection using transient SEC_IMAGE sections, custom crypter, and ADS payload delivery no disk traces, maximum stealth. #malwaredev #maldev #malware_development @ZwLowLevel https://git…»
API Hooking – Tales from a Hacker’s Hook Book

This is called Hooking—the process by which an application intercepts an API call between two other applications. In the example above, the intercepting function (called a hook procedure) altered the data passed onto the recipient (the text editor), but that is not always the case.

#windows_internals
#api_hooking
#inline_hooking

@ZwLowLevel
https://www.cynet.com/attack-techniques-hands-on/api-hooking/
Forwarded from Infosec Fortress (Amir M. Jahangirzad)
Breaking the BeeStation: Inside Our Pwn2Own 2025 Exploit Journey

🔗 Link

#exploitation
#synology
#pwn2own
———
🆔 @Infosec_Fortress
Modern iOS Security Features – A Deep Dive into SPTM, TXM, and Exclaves

#os_internals
@ZwLowLevel

https://arxiv.org/pdf/2510.09272
Low Level CO 🇨🇴 pinned «Malware Just Got Its Free Passes Back! Moonwalk++ Bypasses EDR by Spoofing Windows Call Stacks #malware_development #edr_bypass #edr_evasion #maldev #malwaredev @ZwLowLevel https://klezvirus.github.io/posts/Moonwalk-plus-plus/»
Forwarded from 1N73LL1G3NC3
ESC1-unPAC (BOF)

A Beacon Object File (BOF) that performs the complete ESC1 attack chain in a single execution: certificate request with arbitrary SAN (+SID), PKINIT authentication, and NT hash extraction via UnPAC-the-hash.
Forwarded from HyperDbg News & Updates
We'll be at #FOSDEM 2026 in Brussels (January 31-February 1) with talks in the Security, Virtualization, and Cloud Infrastructure rooms about the HyperDbg debugger.

More info:
- https://fosdem.org/2026/schedule/event/mbec_slat_and_hyperdbg_hypervisor-based_kernel-_and_user-mode_debugging/

- https://fosdem.org/2026/schedule/event/invisible_hypervisors_debugging_with_hyperdbg/

#FOSDEM2026
Low Level CO 🇨🇴 pinned «Rehabilitating Registry Tradecraft with RegRestoreKey Next Generation Endpoint Security #edr_evasion #edr_bypass @ZwLowLevel https://www.originhq.com/blog/rehabilitating-registry-tradecraft-with-regrestorekey»
macOS Internals Explained: A Dive into the Operating System’s Architecture
#macos_internals
#os_internals
@ZwLowLevel
https://hackmag.com/security/macos-tech-overview