I will be presenting a webinar about some of the red team tradecraft I use.
- Azure Entra ID phishing
- Why PetitPotam is still a thing in 2024.
- Getting code execution with modern EDR
- Targeting the browser to get credentials
Register now: linkedin.com/posts/charles-…
All truths are but half’s truths. One persons black hat is another’s white hat. All you can do is follow your own heart and listen to your own inner truth. Morality is subjective and perspectives change. I’m actually skeptical of anyone with an extreme position on this topic.
okay, hear me out. it's NOT hard to achieve whatever you're pursuing in life. whatever you're trying to do right now, anyone with a braincell and an internet connection can do it. the difference between them and you is that they're taking consistent action every single day.…
Hey Vulnlab Community!
Just taking a moment to reflect on how far we've come together. It's been about a year since Vulnlab first launched, and now we've got around 100 vulnerable machines spread across 50 labs, 2300 Discord members and more than 700 lab users!
The main focus…
Watching people tweet they bypassed a certain EDR is just cringe at this point. When you ask them what did they bypass, they dont know what. So let me take you back to school...
Executing OpenSource tool is not a bypass. An EDR employs several mechanisms for detection. Getting a…
Just had the realization that people who don't use military time (24hr clock for non-Americans) are unaware of the mini celebration we have at 1:37 pm if we happen to glance at the time.
It's tragic. You poor people. 😩
Within this blog, I've articulated a comprehensive overview of both Direct and Indirect syscall techniques. Furthermore, I conducted a reverse engineering analysis on Cobalt Strike beacon to ascertain the specific method it employs.
d01a.github.io/syscalls/#cobaltstrike#infosec
Use C, and some inline assembly, to create a self-extracting shellcode executable!
This solution was inspired by @hasherezade's C to Shellcode method, and was the basis for my solution to @MalDevAcademy's shellcode challenge.
Check it out!
steve-s.gitbook.io/0xtriboulet/ju…
I've created a post exploiting the HEVD driver arbitrary overwrite on a modern Win10 (22H2). I used a single gadget to take control over the stack in order to eventually execute shellcode in the kernel.
Check it out here 0dr3f.github.io/2023/07/14/HEV…
Second blog post to finish out the week. Expanding on a previous tweet to look at how LAPS 2.0 crypto works, how the PowerShell Get-LAPSADPassword cmdlet works, and provided a quick BOF to do pull and decrypt msLAPS-EncryptedPassword blog.xpnsec.com/lapsv2-interna…
"Should I learn Python, or should I learn how to use ChatGPT to write programs for me?" my non-technical friend's son asked me today at a lunch gathering.
The question reminded me of a similar one circulating about 10 years ago: "Should I learn C programming, or should I learn…
3 Followers 168 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/uqZ7AshrCE
6 Followers 446 FollowingMEXC focuses on financial management, stocks, cryptocurrencies, digital assets and investments. Currently, new users can get free dollars when they sign up.
12K Followers 10K FollowingFormer US Most Wanted Cybercriminal Turned Good Guy. Speaker, Consultant, Writer, Podcaster. Now Protecting you from the type of person I used to be.
2K Followers 193 Followingjust a young Ghanaian girl trying to make this hustle worth it. … one day one day ..!!! For the love of Ghana 🇬🇭 we must Rescue it !!!
15K Followers 521 FollowingRE and More by Alexey Kleymenov (https://t.co/s1pWjL46AW). Private classes and group workshops in malware analysis and reverse engineering. #infosec #malware
16K Followers 2K FollowingASK is your Hub for Undiluted History, Insightful Threads, and Trending News. Follow us, turn on notifications 🔔, and let's get more interactive!
9K Followers 298 FollowingMassimiliano Colasuonno Taricone.Console del Ghana in Italia,Ghana state of mind 🇬🇭♥️Trasacco my World, here my opinions rtw is not endorsement anche se boh..
9K Followers 333 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
5K Followers 9 FollowingPaged Out! is a free magazine about programming, hacking, security hacking, retro computers, modern computers, electronics, demoscene, and other amazing topics.
1K Followers 1 FollowingThis is the X page for the Off By One Security YouTube channel and Discord server. Streams every Friday at 11AM PT. https://t.co/Q8qt342Nhx
50K Followers 225 FollowingMaker of #TicNote, #TicWatch and #MobvoiTreadmills. Mobvoi is an AI company that strives to push the boundaries of next-generation human-machine interaction.
2K Followers 5K FollowingDistracted by & lowly student of infosec, offsec, opsec, onsec, upsec, oscp, vulns, exploits. My jokes are lame. Stay Curious.
Will randomly comment on old news
8K Followers 132 FollowingWe are a hi-tech company focusing on binary software analysis. Our main products are IDA Pro and the Hex-Rays Decompiler.
Discourse: https://community.hex-rays
1.8M Followers 1K FollowingFounder @ksheldonstudios| I create and host shows over the internet.. Click on the link below to access..| Contact| [email protected]
3K Followers 33 FollowingBallisKit provides tooling and services to professional Pentesters & Red Teams.
We develop MacroPack, ShellcodePack, and DarwinOps.
#redteam #infosec
5K Followers 374 FollowingCurrently Senior Windows Core OS Engineer, Windows Internals Enthusiast and Book author, tennis lover, currently working for MS. Opinions and tweets are my own.