Low Level CO 🇨🇴 – Telegram
Low Level CO 🇨🇴
121 subscribers
178 photos
10 videos
7 files
542 links
Canal enfocado en la investigación de técnicas de seguridad ofensivas avanzadas.

Windows internals
Malware Development
Exploits & Reversing
Low level programming
kernel mode & user mode
Syscall & Hypercalls
Ring 0, 3, -1
Firmware
Download Telegram
Forwarded from Freedom Fox 🏴‍☠
GhostlyHollowingViaTamperedSyscalls2

Ghostly Hollowing + Tampered Syscalls Via Hardware Breakpoints: Utilizing hardware breakpoints to spoof syscall arguments while implementing Ghostly Hollowing PE #Injection technique

#av #работягам

Чат в МАХ
Telegram ✉️ @freedomfox
Please open Telegram to view this post
VIEW IN TELEGRAM
Happy New Year 🎊

We hope this new year is full of success and blessings, that you achieve all your goals, and that there is peace and harmony in your family.
🔥1
Good Morning, I just back!
ActiveBreach Engine

SysWhispers & HellsGate Successor, Direct Syscall Execution Framework using modern techniques - EDR/AV Evasion

#malware_development
#maldev
#malwaredev
@ZwLowLevel
Channel name was changed to «Low Level CO 🇨🇴»
Forwarded from Freedom Fox 🏴‍☠
Exploit-Street

Сборник самых свежих #LPE эксплойтов от нашего соотечественика. #Windows In The Fire🔥

Чат в МАХ
Telegram ✉️ @freedomfox
Please open Telegram to view this post
VIEW IN TELEGRAM
Venezuelan President's Maduro was taken down
👻1
Machine Learning-Based Cybersecurity Solutions for Cloud Computing

Traditional signature-based security solutions detect known threats through pattern matching against databases of malware signatures and attack indicators. This approach fails against zero-day exploits, polymorphic malware employing code obfuscation, and advanced persistent threats (APTs) utilizing novel attack techniques.

#machine_learning
#llm
#reinforcement_learning
#ai

@ZwLowLevel
https://eudoxuspress.com/index.php/pub/article/view/4595/3409
Windows ARM64 Internals: Pardon The Interruption! Interrupts on Windows for ARM

#windows_internals
#windows_kernel
#arm64
#ring0

https://connormcgarr.github.io/windows-arm64-interrupts/