😈 [ Tyl0us, Matt Eidelberg ]
Check out my talk focusing on shining a light on the mindset of a red team and how they covertly compromise an organization’s security. Lots of great TTPs and stories to share check it out #SourceZeroCon https://t.co/FiiVCJhi0t #netsec #redteam #evasion
🔗 http://bit.ly/3K3argl
🐥 [ tweet ]
Check out my talk focusing on shining a light on the mindset of a red team and how they covertly compromise an organization’s security. Lots of great TTPs and stories to share check it out #SourceZeroCon https://t.co/FiiVCJhi0t #netsec #redteam #evasion
🔗 http://bit.ly/3K3argl
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ aetsu, 𝕬𝖊𝖙𝖘𝖚 ]
A blueprint for evading industry leading endpoint protection in 2022 -> https://t.co/Vf69P9ZUuA
🔗 https://vanmieghem.io/blueprint-for-evading-edr-in-2022/
🐥 [ tweet ]
A blueprint for evading industry leading endpoint protection in 2022 -> https://t.co/Vf69P9ZUuA
🔗 https://vanmieghem.io/blueprint-for-evading-edr-in-2022/
🐥 [ tweet ]
🔥2
Forwarded from Offensive Xwitter Eye
😈 [ harmj0y, Will Schroeder ]
In my first foray into what @moo_hax terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at https://t.co/oL7jBbPiJQ and can find the notebook + Dockerized model at https://t.co/jXsMDVEwOo
🔗 https://posts.specterops.io/deeppass-finding-passwords-with-deep-learning-4d31c534cd00
🔗 https://github.com/GhostPack/DeepPass
🐥 [ tweet ]
In my first foray into what @moo_hax terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at https://t.co/oL7jBbPiJQ and can find the notebook + Dockerized model at https://t.co/jXsMDVEwOo
🔗 https://posts.specterops.io/deeppass-finding-passwords-with-deep-learning-4d31c534cd00
🔗 https://github.com/GhostPack/DeepPass
🐥 [ tweet ]
🔥1
Forwarded from Offensive Xwitter Eye
😈 [ hackinarticles, Hacking Articles ]
A Detailed Guide on Rubeus
https://t.co/XmD8LfJGY5
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/a-detailed-guide-on-rubeus/
🐥 [ tweet ]
A Detailed Guide on Rubeus
https://t.co/XmD8LfJGY5
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/a-detailed-guide-on-rubeus/
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ hackinarticles, Hacking Articles ]
Domain Persistence: Silver Ticket Attack
https://t.co/GDmxv0kJID
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-persistence-silver-ticket-attack/
🐥 [ tweet ]
Domain Persistence: Silver Ticket Attack
https://t.co/GDmxv0kJID
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-persistence-silver-ticket-attack/
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ hackinarticles, Hacking Articles ]
Domain Escalation: Unconstrained Delegation
https://t.co/qWxRjcg7UF
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-escalation-unconstrained-delegation/
🐥 [ tweet ]
Domain Escalation: Unconstrained Delegation
https://t.co/qWxRjcg7UF
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-escalation-unconstrained-delegation/
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ hackinarticles, Hacking Articles ]
Domain Persistence: Golden Certificate Attack
https://t.co/SmMarfX7hK
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-persistence-golden-certificate-attack/
🐥 [ tweet ]
Domain Persistence: Golden Certificate Attack
https://t.co/SmMarfX7hK
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #servers #windows
🔗 https://www.hackingarticles.in/domain-persistence-golden-certificate-attack/
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ hackinarticles, Hacking Articles ]
Best of Nmap Cheat Sheet
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #nmap
🐥 [ tweet ]
Best of Nmap Cheat Sheet
#infosec #cybersecurity #cybersecuritytips #pentesting #oscp #redteam #informationsecurity #cissp #CyberSec #networking #networksecurity #CheatSheet #nmap
🐥 [ tweet ]
👍2
😈 [ skelsec, SkelSec ]
Long time since I last wrote an article. Nothing earth-shattering, but fun!
🔗 https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8
🐥 [ tweet ]
Long time since I last wrote an article. Nothing earth-shattering, but fun!
🔗 https://skelsec.medium.com/lsass-needs-an-iv-57b7333d50d8
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ Dinosn, Nicolas Krassas ]
Articles with ready to use commands for pentest and CTF
https://t.co/zMnvHt01qU
🔗 https://hideandsec.sh/books/cheatsheets-82c
🐥 [ tweet ]
Articles with ready to use commands for pentest and CTF
https://t.co/zMnvHt01qU
🔗 https://hideandsec.sh/books/cheatsheets-82c
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]
WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof
🔗 https://github.com/pwn1sher/WMEye
🐥 [ tweet ]
WMEye. tool for performing Lateral Movement using WMI and remote MSBuild Execution
https://t.co/wi9ZdNVrof
🔗 https://github.com/pwn1sher/WMEye
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
😈 [ DirectoryRanger, DirectoryRanger ]
S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um
🔗 https://github.com/daem0nc0re/PrivFu#s4udelegator
🐥 [ tweet ]
S4uDelegator. tool to perform S4U logon with SeTcbPrivilege, by @@daem0nc0re
https://t.co/7qFTFtX6Um
🔗 https://github.com/daem0nc0re/PrivFu#s4udelegator
🐥 [ tweet ]
👍1
😈 [ m3g9tr0n, Spiros Fraganastasis ]
How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5
🔗 https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/
🐥 [ tweet ]
How the Active Directory Replication Model Works
https://t.co/oQKPMswqK5
🔗 https://premglitz.wordpress.com/2013/03/20/how-the-active-directory-replication-model-works/
🐥 [ tweet ]
🔥2👍1
😈 [ citronneur, Sylvain Peyrefitte ]
Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy
🔗 https://github.com/airbus-cert/ttddbg
🐥 [ tweet ]
Time Travel Debugging for #IDA https://t.co/9QRB0UBuAy
🔗 https://github.com/airbus-cert/ttddbg
🐥 [ tweet ]
👍1
Forwarded from Offensive Xwitter Eye
👹 [ snovvcrash, sn🥶vvcr💥sh ]
Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫡
🐥 [ tweet ]
Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current mood is like the Burning Chrome last paragraphs 🫡
🐥 [ tweet ]
Forwarded from Offensive Xwitter Eye
Offensive Xwitter Eye
👹 [ snovvcrash, sn🥶vvcr💥sh ] Two-week security assessment is over, finally… Way too many lessons learned, oh well. Here’s the final step of taking down the critical OpenShift cluster with a single curl (hard-coded tokens is always a bad idea). So current…