😈 [ m3g9tr0n, Spiros Fraganastasis ]
An excellent article by @martinsohndk about Windows Shares post exploitation activities! You will be impressed with the amount of information which can be found by digging in shares https://t.co/LiriUP3xVE
🔗 https://improsec.com/tech-blog/network-share-risks-deploying-secure-defaults-and-searching-shares-for-sensitive-information-credentials-pii-and-more
🐥 [ tweet ]
An excellent article by @martinsohndk about Windows Shares post exploitation activities! You will be impressed with the amount of information which can be found by digging in shares https://t.co/LiriUP3xVE
🔗 https://improsec.com/tech-blog/network-share-risks-deploying-secure-defaults-and-searching-shares-for-sensitive-information-credentials-pii-and-more
🐥 [ tweet ]
👍1
😈 [ fr0gger_, Thomas Roccia 🤘 ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? 🐍
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
🔗 https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
🐥 [ tweet ]
I published a blogpost that presents ten useful python libraries that I use for malware analysis and reversing (with code examples)!
Which one are you using the most? 🐍
#python #malware #cybersecurity #infosec
https://t.co/4q7N0ydQJa
🔗 https://blog.securitybreak.io/10-python-libraries-for-malware-analysis-and-reverse-engineering-622751e6ebd0
🐥 [ tweet ]
😈 [ ShitSecure, S3cur3Th1sSh1t ]
My DInvoke implementation in Nim is now also public:
https://t.co/4sNjTVsYfv
Feel free with testing and have fun! 🍻👌
Challenge: who modifies the Nim compiler for DInvoke usage?🤓
🔗 https://github.com/S3cur3Th1sSh1t/Nim_DInvoke
🐥 [ tweet ]
My DInvoke implementation in Nim is now also public:
https://t.co/4sNjTVsYfv
Feel free with testing and have fun! 🍻👌
Challenge: who modifies the Nim compiler for DInvoke usage?🤓
🔗 https://github.com/S3cur3Th1sSh1t/Nim_DInvoke
🐥 [ tweet ]
🔥2
😈 [ ntlmrelay, Ring3API ]
🐍 Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1️⃣Get Obsidian (https://t.co/ZBOCQ2ez7U)
2️⃣Generate Vault (https://t.co/3A5dbhoRC2)
3️⃣Explore!
#blueteam #threathunting #ThreatIntelligence
🔗 https://obsidian.md/
🔗 https://github.com/arch4ngel/sec-vault-gen
🐥 [ tweet ]
🐍 Python utility to generate #MITRE ATT&CK Vault for #Obsidian.
1️⃣Get Obsidian (https://t.co/ZBOCQ2ez7U)
2️⃣Generate Vault (https://t.co/3A5dbhoRC2)
3️⃣Explore!
#blueteam #threathunting #ThreatIntelligence
🔗 https://obsidian.md/
🔗 https://github.com/arch4ngel/sec-vault-gen
🐥 [ tweet ]
👍2
😈 [ DebugPrivilege, • ]
Great blog post on hijacking Azure subnoscriptions. https://t.co/i2zQHrazu2
🔗 https://derkvanderwoude.medium.com/azure-subnoscription-hijacking-and-cryptomining-86c2ac018983
🐥 [ tweet ]
Great blog post on hijacking Azure subnoscriptions. https://t.co/i2zQHrazu2
🔗 https://derkvanderwoude.medium.com/azure-subnoscription-hijacking-and-cryptomining-86c2ac018983
🐥 [ tweet ]
😈 [ bohops, bohops ]
[Quick Update] Added a few new and old resources/techniques to the WDAC Block List
https://t.co/2AhEtQ2aS0
I'll post a few more blogs in the coming months to include Part 3 of the "Exploring the Microsoft Recommended Block Rules" series as well as some new
techniques
🔗 https://github.com/bohops/UltimateWDACBypassList
🐥 [ tweet ]
[Quick Update] Added a few new and old resources/techniques to the WDAC Block List
https://t.co/2AhEtQ2aS0
I'll post a few more blogs in the coming months to include Part 3 of the "Exploring the Microsoft Recommended Block Rules" series as well as some new
techniques
🔗 https://github.com/bohops/UltimateWDACBypassList
🐥 [ tweet ]
😈 [ byt3bl33d3r, Marcello ]
This is neato
"Alpine, Ubuntu, Fedora, and Arch based containers containing full desktop environments in officially supported flavors accessible via any modern web browser."
https://t.co/VSTYMXDYma
🔗 https://docs.linuxserver.io/images/docker-webtop
🐥 [ tweet ]
This is neato
"Alpine, Ubuntu, Fedora, and Arch based containers containing full desktop environments in officially supported flavors accessible via any modern web browser."
https://t.co/VSTYMXDYma
🔗 https://docs.linuxserver.io/images/docker-webtop
🐥 [ tweet ]
🔥1
😈 [ Six2dez1, Six2dez ]
I can't say enough about how useful @TomNomNom's hacks repository is. Lately whenever I need something I go there to take a look because it almost always has the solution, so I can never improve my Golang skills!
Latest discovery https://t.co/0DYgf4qkko
long live open source❤️
🔗 https://github.com/tomnomnom/hacks/tree/master/inscope
🐥 [ tweet ]
I can't say enough about how useful @TomNomNom's hacks repository is. Lately whenever I need something I go there to take a look because it almost always has the solution, so I can never improve my Golang skills!
Latest discovery https://t.co/0DYgf4qkko
long live open source❤️
🔗 https://github.com/tomnomnom/hacks/tree/master/inscope
🐥 [ tweet ]
👍1
😈 [ mttaggart, Taggart ]
I'd just like to point out that a number of us have been providing free, high quality infosec content on Twitch for years without so much as a blurb in the Register.
@goproslowyo
@0xTib3rius
@Alh4zr3d
@xfootpics4salex
@ShawnLo
And many more at https://t.co/LnMWvE4jwN https://t.co/MB2rYdNPjC
🔗 https://infosecstreams.github.io/
🐥 [ tweet ][ quote ]
I'd just like to point out that a number of us have been providing free, high quality infosec content on Twitch for years without so much as a blurb in the Register.
@goproslowyo
@0xTib3rius
@Alh4zr3d
@xfootpics4salex
@ShawnLo
And many more at https://t.co/LnMWvE4jwN https://t.co/MB2rYdNPjC
🔗 https://infosecstreams.github.io/
🐥 [ tweet ][ quote ]
👹 [ snovvcrash, sn🥶vvcr💥sh ]
Was trying to improve my #password #spraying approach in AD by previewing FGPPs and mapping them to the users they’re applied to, but it turns out you have to be an admin to do that 😒
🐥 [ tweet ]
Was trying to improve my #password #spraying approach in AD by previewing FGPPs and mapping them to the users they’re applied to, but it turns out you have to be an admin to do that 😒
🐥 [ tweet ]
🔥1
😈 [ CyberarkLabs, CyberArk Labs ]
Passwords and cookies are stored in Chrome’s memory in clear-text. Attackers can load into memory all the passwords that are stored in the password manager (“Login Data” file).
https://t.co/L1JRO22ktu
🔗 http://spr.ly/6017zZ6Ft
🐥 [ tweet ]
Passwords and cookies are stored in Chrome’s memory in clear-text. Attackers can load into memory all the passwords that are stored in the password manager (“Login Data” file).
https://t.co/L1JRO22ktu
🔗 http://spr.ly/6017zZ6Ft
🐥 [ tweet ]
👍3