Two Seven One Three
banner
twosevenonethree.bsky.social
Two Seven One Three
@twosevenonethree.bsky.social
Chief Security Officer (CSO) || Security Researcher at https://ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
We can exploit the #securityvulnerability of Windows Error Reporting to put EDRs and #antimalware into a coma-like state.
By using the EDR-Freeze #redteam tool:
Github: TwoSevenOneT/EDR-Freeze
September 21, 2025 at 7:19 AM
#redteam
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
September 13, 2025 at 7:41 AM
#redteam
You can exploit the update functionality vulnerability of #Windows Defender to move its executable folder to a location of your choosing. After that, you can use DLL Sideloading for persistence, inject code, or simply disable it...
#blueteam
September 8, 2025 at 1:49 PM
It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware
#PenTesting #BlueTeam
September 7, 2025 at 9:20 AM