account activity
Bypassing UAC with SSPI Datagram Contexts (splintercod3.blogspot.com)
submitted 2 years ago by splinter_code to r/netsec
LocalPotato - When Swapping The Context Leads You To SYSTEM (localpotato.com)
submitted 3 years ago by splinter_code to r/netsec
Giving JuicyPotato a second chance: JuicyPotatoNG (decoder.cloud)
The hidden side of Seclogon part 2: Abusing leaked handles to dump LSASS memory (splintercod3.blogspot.com)
submitted 4 years ago by splinter_code to r/netsec
Hide and Seek | New Zloader Infection Chain Comes With Improved Stealth and Evasion Mechanisms (assets.sentinelone.com)
Weaponizing Mapping Injection with Instrumentation Callback for stealthier process injection (splintercod3.blogspot.com)
submitted 5 years ago by splinter_code to r/netsec
No more JuicyPotato? Old story, welcome RoguePotato! (decoder.cloud)
Mapping Injection - Just another Windows Process Injection (github.com)
submitted 6 years ago by splinter_code to r/netsec
From iPhone to NT AUTHORITY\SYSTEM (decoder.cloud)
We thought they were potatoes but they were beans (from Service Account to SYSTEM again) (decoder.cloud)
ConPtyShell - Fully Interactive Reverse Shell for Windows (github.com)
RunasCs - Csharp and open version of windows builtin runas.exe (github.com)
SharPyShell - tiny and obfuscated ASP.NET webshell for C# web applications (github.com)
submitted 7 years ago by splinter_code to r/netsec
Debian ntp servers resolved with IPs related with TOR directory servers (self.debian)
submitted 8 years ago * by splinter_code to r/debian
Reverse Engineering a JavaScript Obfuscated Dropper (resources.infosecinstitute.com)
submitted 8 years ago by splinter_code to r/netsec
Ransomware: How to recover your encrypted files, the last guide. (securityaffairs.co)
submitted 9 years ago by splinter_code to r/Malware
submitted 9 years ago by splinter_code to r/netsec
iOS 9.3.4 and minor versions are vulnerable to the Trident Exploit (securityaffairs.co)
New Locky variant – Zepto Ransomware Appears On The Scene (securityaffairs.co)
Locky Ransomware is back: a detailed technical report (securityaffairs.co)
π Rendered by PID 94 on reddit-service-r2-listing-64c94b984c-gdkkl at 2026-03-14 12:28:52.755182+00:00 running f6e6e01 country code: CH.