Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
122 subscribers
178 photos
10 videos
7 files
540 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
NtQuery(*) is a native powerful API!
Una buena plataforma para poner a prueba tus habilidades de RE & Malware Analysis.

https://malops.io/
🥰1
Thread Name Calling Injection

This technique abuses Windows APIs originally designed for setting and retrieving thread names (denoscriptions) to inject shellcode or load DLLs into a remote process.
#malware_development
#malwaredev
#maldev
@ZwLowLevel
🔥1
Forwarded from Sec Note
Analyzing Avast AV: Kernel Hooking and Driver Reverse Engineering
👾Presentation Video

Blog:
https://binary-win.github.io/2025/12/27/AVAST-Kernel-Hooks-and-AV-ANALYSIS.html
👏1😱1
Prompt poaching runs rampant in extensions

Similarweb, a popular browser extensions with 1,000,000+ users, is actively monitoring and collecting data from AI tools transmitting your prompts, responses, and other metadata for web analytics. Prompt Poaching is a technique growing in popularity in which extensions capture and exfiltrate conversations you have with AI.

#offtopic
@ZwLowLevel
https://secureannex.com/blog/prompt-poaching
Forwarded from Freedom Fox 🏴‍☠
GhostlyHollowingViaTamperedSyscalls2

Ghostly Hollowing + Tampered Syscalls Via Hardware Breakpoints: Utilizing hardware breakpoints to spoof syscall arguments while implementing Ghostly Hollowing PE #Injection technique

#av #работягам

Чат в МАХ
Telegram ✉️ @freedomfox
Please open Telegram to view this post
VIEW IN TELEGRAM
Happy New Year 🎊

We hope this new year is full of success and blessings, that you achieve all your goals, and that there is peace and harmony in your family.
🔥1
Good Morning, I just back!
ActiveBreach Engine

SysWhispers & HellsGate Successor, Direct Syscall Execution Framework using modern techniques - EDR/AV Evasion

#malware_development
#maldev
#malwaredev
@ZwLowLevel