Finally were done with season 8, Ggs to my team 🔥. This season was fun with windows machines.
Everytime I saw a new windows I just knew it either will learn or add something new, and it happened to almost all the windows machines😂
🎇 Website now has 7k active users, up another 3k from 4 days ago!
💥added a link on the desktop for sponsorship opportunities for those who may be interested
💥 also a link to my resume as i am still actively looking for employment
Last night I worked on some optimization…
How to find the Entra ID sync server - A new NetExec module🔎
Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server.
Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
🔍⬆️ Ready to level up your PEN-200 skills?
Join us for our next #OffSecLive session where we’ll walk through the PG Practice Apex machine, step by step.
From information gathering to public exploits, fixing code, and tackling password attacks, this session is packed with…
🚨 OSCP GIVEAWAY ALERT🚨
We’re giving away 3 OSCP vouchers to supercharge your pentesting journey – proudly sponsored by @offsectraining ! 💥🙌
To enter:
1.✅ Follow Us
2.🔁 Retweet this post
3.❤️ Like this post
4.💬 Reply with your funniest cybersecurity meme
🎯 We’ll pick 3…
Things I need right now;
A congratulations email or I just might lose it (Not Spams).
A 2-5k$ a month role
An offensive security role that I'll actually love and will learn so much on.
A new NetExec module just got merged: eventlog_creds🔥
It parses Windows Event ID 4688 logs (from "Audit Process Creation") to extract credentials from CMD and PowerShell commands. E.g. "net user username password /add" will be detected. Made by @lodos2005
Looks can be deceiving 😶🌫️
2 new labs are coming to the #HackTheBox platforms this week!
🔵 Trojan, a Sherlock where you analyze the different pieces of evidence to extract IOCs and reconstruct the phases of the infection, created by MrManj
🔴 Puppy, an #HTB Seasons Machine…
piece of cake 🍰. Easy box are always 1-2 steps and ur in, the same with root just few steps and ur done. Used my military technique to get the flag 😁, I was bored with that cleanup script.
2K Followers 689 FollowingLa página de Alejandro Corletti Estrada.
La mayor oferta de contenidos en Ciberseguridad
- Vídeos
- Libros
- Cursos
Garantía de calidad: 100% GRATIS 👌
1K Followers 681 FollowingDirectory of Twitter Spaces rooms, both one-time or recurring rooms. Contact us to gain access to the calendar. Include us in your promotion tweet and we'll RT.
612 Followers 6K FollowingBJP|RSS-Nager IT Pramukh (Noida), Assistant Vice President-CTI, Ex-Army,MBA|CISM,CHFI,CEH,Security+,ISO Audits,GRC,Malware & Dark Web Research,Cyber Law SPL.
1K Followers 3K FollowingSecurity Research Engineer 💂
Founder of CTF Team: Hack@Sec 🇳🇵
Crypto and Web w/@hackasec 🕸️
Blackhat MEA 2023/24 CTF Finalist 🎩
BBH at Hacker0x01 🐞🇳🇵
660 Followers 959 FollowingSecurity Bod. Interested in networks, locksport, security, political rants, and crisps. Advocate for FOSS. Views are mine and not my employers. #StayFrosty
670 Followers 3K FollowingDFIR, Malware & CTI. Head of a CSIRT. Ex @ANSSI_FR. PhD in intl law. Mostly working on Chinese #APT but also on russian and cybercrime actors #CTI #Malware
380 Followers 627 FollowingApplied Systems Research - Worms, Signals & Systems
Writer of flash fiction. Expert in criminal investigations, evidence custody, and Information Security.
23K Followers 490 FollowingBlue Teamer in Disguise. Blog at https://t.co/spa33ybIVL. SANS Netwars Champion. Former community manager and founder of the Offsec community for @offsectraining