Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
121 subscribers
178 photos
10 videos
7 files
540 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
HeapHunter

A unique technique that leverages the inner working of C++, specifically Pure Virtual Functions and Abstract Classes, to hijack AMSI without patching any RX in a .text section memory.

#malware_development
#malwaredev
#amsi_bypass

@ZwLowLevel
https://github.com/Yair-Men/HeapHunter
Have you tried turning it off and on again?

The article explains why the classic advice “turn it off and on again” is still effective in modern computing. It argues that software failures are inevitable due to system complexity, and restarting often clears temporary states, bugs, or resource issues. Rather than treating this as a weakness, the author suggests that software should be designed to fail gracefully and make recovery — such as restarting or reinstalling — simple and reliable.

@ZwLowLevel
https://eblog.fly.dev/onoff.html
DNGerousLINK: A Deep Dive into WhatsApp 0-Click Exploits on iOS and Samsung Devices

The spyware attack targeting WhatsApp, disclosed in August as an in-the-wild exploit, garnered significant attention. By simply knowing a victim's phone number, an attacker could launch a remote, zero-interaction attack against the WhatsApp application on Apple devices, including iPhones, iPads, and Macs. Subsequent reports indicated that WhatsApp on Samsung devices was also targeted by similar exploits.

#binary_exploitation
#exploitation
#android_malware

@ZwLowLevel
https://media.ccc.de/v/39c3-dngerouslink-a-deep-dive-into-whatsapp-0-click-exploits-on-ios-and-samsung-devices
NtQuery(*) is a native powerful API!
Una buena plataforma para poner a prueba tus habilidades de RE & Malware Analysis.

https://malops.io/
🥰1
Thread Name Calling Injection

This technique abuses Windows APIs originally designed for setting and retrieving thread names (denoscriptions) to inject shellcode or load DLLs into a remote process.
#malware_development
#malwaredev
#maldev
@ZwLowLevel
🔥1
Forwarded from Sec Note
Analyzing Avast AV: Kernel Hooking and Driver Reverse Engineering
👾Presentation Video

Blog:
https://binary-win.github.io/2025/12/27/AVAST-Kernel-Hooks-and-AV-ANALYSIS.html
👏1😱1
Prompt poaching runs rampant in extensions

Similarweb, a popular browser extensions with 1,000,000+ users, is actively monitoring and collecting data from AI tools transmitting your prompts, responses, and other metadata for web analytics. Prompt Poaching is a technique growing in popularity in which extensions capture and exfiltrate conversations you have with AI.

#offtopic
@ZwLowLevel
https://secureannex.com/blog/prompt-poaching