NEED YOUR HELP!
My Friend/Teacher Soroush (@irsdl) Is looking for a new company to join, you know him as the .NET-God, the guy who has popped exchange, sharepoint, has maintained ysoserial_.net for years, contributed to the exploitation scene numerous times, taught all of you…
I completed Hell's Gate technique in Zig 🤠, and the blog post is live. It's the first in a series, with more exciting content to come.
0xsp.com/security%20res…
For anyone using BRC4. My colleage @dis0rder_0x00 ported several BOFs to COFF format and we made a pull request to the official repo: 🔥🔥
github.com/paranoidninja/…
Including:
AAD PRT
Get Azure Token
Multi RDP
PetitPotam
Session Enum
SelfDelete
Cookie Monster
SSPI UAC Bypass
Today, together with Jonathan Elkabas, we're releasing EntraGoat - A Deliberately Vulnerable Entra ID Environment.
Your own hands-on Entra lab for identity attack simulation.
Built for red teams, blue teams and identity nerds.
Check it out here👉github.com/semperis/entra…
My first @SpecterOps blog!
Ever wanted to collect Active Directory information from LDAP for a Red Team?
Using LDAP's more OPSEC-considerate cousin: ADWS can be used to improve upon the already present advantages of using smaller-scaling LDAP queries.
specterops.io/blog/2025/07/2…
If you're lazy like me and you use Linux for testing, the last thing you want is to spin up your Windows VM to compile some windows tooling. 😩
DockPiler lets you cross-compile Windows binaries right from Linux using docker.
github.com/ar0x4/DockPiler
Created small tool that joins a device to a Tailscale network and exposes a local SOCKS proxy. It’s built for red team pivots and quick access into (restricted) environments. The underlying tsnet library is currently Go-only, so it's semi-portable for now.
github.com/Yeeb1/SockTail
Very grateful for last week spent at @x33fcon!
✅️ Gave a training on #socialengineering & #OSINT
✅️ Attended the conference & learned from others
✅️ Reconnected and had a great time with old friends :) @mrgretzky & finally @SEINT_pl . So good to see you!
Can't ask for more!
Last night, I made myself busy and revisited some older methods for exploiting tokens in Windows applications shared by @mrd0x couple of years ago. However, I realized that the integration of AI into applications like Notepad presents new opportunities for exploitation. This led…
Took this as a motivation to dive into BOF development. Shoutout to @ShitSecure for the standalone port to C.
Besides the MultiRDP BOF there also a BOF to triage suspicous accounts in Active Directory in the repo.
github.com/Yeeb1/MagicBOFs
Took this as a motivation to dive into BOF development. Shoutout to @ShitSecure for the standalone port to C.
Besides the MultiRDP BOF there also a BOF to triage suspicous accounts in Active Directory in the repo.
github.com/Yeeb1/MagicBOFs
Just updated my NetExec cheatsheet. Added some new commands and tweaks. It includes the commands I use when working on HackTheBox and Vulnlab machines
github.com/seriotonctf/cm…
If you’re into Malware Development and want to see some cool angles on different techniques, check out this project by a friend of mine, @vxvoid a
github.com/voidvxvt/HellB…
If you’re into Malware Development and want to see some cool angles on different techniques, check out this project by a friend of mine, @vxvoid a
github.com/voidvxvt/HellB…
Dehooking for babies
I'm sitting on this one for a while now, but Trend never ack anything.
Changing your exe name with explorer.exe or Chrome.exe avoid the injection of the DLL and the setup of the userland hooks...
Can be easily found with the DLL reverse engineering
Working on splitting #AADInternals into two modules:
1⃣ AADInternals for the cloud-only functionality
2⃣ AADInternals-Endpoints for all the shady on-prem stuff
Stay tuned!
Working on splitting #AADInternals into two modules:
1⃣ AADInternals for the cloud-only functionality
2⃣ AADInternals-Endpoints for all the shady on-prem stuff
Stay tuned! https://t.co/TviKk6EVWm
I've decided to publish a collection of tools and scripts I've accumulated over the years, many of which I used during competitive hacking. github.com/Yeeb1/shelf
2K Followers 2K Following16 year old whimsical wizard, hacker, and fintech phantom. Red Team & Bug Bounty. CPTS,CRTP | Views are my own. Not affiliated with my employer.
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
7K Followers 2K FollowingGlobal leader in hands-on learning for enterprise and cloud security education. Join 40000+ infosec professionals from 130+ countries
13 Followers 176 FollowingSenior Software Developer
Having Expertise on Big Data,Client-Server Communication,Encryption,Algorithmic Problems using Microsoft and Open Source Languages.
589 Followers 594 FollowingWannabe Red Teamer | OSEP | OSCP | Cybersecurity Consultant | Community Moderator/Advisor @offsectraining | I follow shit ton of illustrators | Views are my own
24 Followers 202 FollowingHacker, Learner, Dreamer… Welcome to my Li(f)e. “Man is least himself when he talks in his own person. Give him a mask and he’ll tell you the truth” #beyourself
62K Followers 286 FollowingA kiwi coding mimikatz & kekeo
github: https://t.co/eS3LVgU6i0
Head of security services @banquedefrance
Tweets are my own and not the views of my employer
89K Followers 910 FollowingProgrammer, #malware analyst. Author of #PEbear, #PEsieve, #TinyTracer. Private account. All opinions expressed here are mine only (not of my employer etc)
60K Followers 795 FollowingThreat intelligence platform - Data from Deep Web, Dark Web, Open Web || For data API integration : [email protected] Democratizing Cyber Security.
145K Followers 847 Following🔑 Sharing AI Prompts, Tips & Tricks. The Biggest Collection of AI Prompts & Guides for ChatGPT, Grok, Claude & Midjourney AI → https://t.co/vwZZ2VSfsN
9K Followers 334 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
130 Followers 489 FollowingTweets are my own. Lucky guy who works with his hobby. 👨🏼💻 Here for the awesome knowledge in the MSFTverse, threat intelligence and FPL tweets.
3K Followers 716 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
109K Followers 98 FollowingThe world's leading Digital Forensics and Incident Response provider. This feed updates you on latest DFIR news, events, and training.
22K Followers 600 FollowingDigital forensics and incident response. Ex-AFOSI, Mandiant, and CrowdStrike. SANS Institute Fellow and co-author of #FOR500 and #FOR508 courses.
5K Followers 950 FollowingVP of Research - @netspi Co-author of “Penetration Testing Azure for Ethical Hackers” (https://t.co/R8AjWWbSyj). @kfosaaen on most other platforms