krp
@_kripteria
@BlackArrowSec https://github.com/Krypteria
I think there is no better definition of my day to day life than this.

Neo4LDAP - a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to BloodHound github.com/Krypteria/Neo4…
I have more visibility here than on linkedln even though I only have 44 followers vs 600. that's wild 😅
I've just released Eclipse, a PoC of what I call Activation Context Hijack. This technique redirects any application to load an arbitray DLL, allowing to inject code into any trusted process. More info available on Github. github.com/Kudaes/Eclipse
⚔️ ¿Sabías que los servicios de Threat Hunting e Incident Response son esenciales a la hora de detectar y responder ante amenazas? José Lancharro, director de @BlackArrowSec, va a impartir un taller sobre cómo neutralizar las amenazas. ✍🏼 Inscríbete: events.teams.microsoft.com/event/56eb5a3d…
I created a tool designed to simplify the generation of proxy DLLs (i know, a bit late to the game) while addressing common conflicts related to windows.h when it comes to redefining an existing function when performing proxy DLL. It was a fun project 😁 github.com/Krypteria/Prox…
¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals #Malware #EDR @_Kudaes_
Are you aware of this technique for achieving fileless persistence? Find out how it works and how to detect it. ➡️ github.com/blackarrowsec/…
In a few hours, our colleague @_Kudaes_ will talk at @EuskalHack about call stack spoofing to hide the execution of implants from memory. #ESCVII ➡️ Read more: securitycongress.euskalhack.org/ponentes_es.ht…
Nuevo ponente confirmado para EuskalHack Security Congress VII: Kurosh Dabbagh con la charla "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" @_Kudaes_ #ESCVII > securitycongress.euskalhack.org/ponentes_es.ht…
🤘🏼 Success. @antuache and @calvaruga, @BlackArrowSec Red Team specialists, not only took control of an EDR but also captured the attention of the entire @rootedcon.
🟣 “Look at me, I’m the EDR now” con 👥Antón Ortigueira Vázquez (@antuache) y Marcos Díaz Castiñeiras (@Calvaruga) de 13:00 a 14:00, en la sala 20.
Although it's nothing new, @ineesdv and I are pleased to publish our own ROP-based implementation of the code fluctuation technique. We've tried to keep it simple and functional, avoiding to use common features like Timers, HWBP or APCs. github.com/Kudaes/Shelter