⚠️ Trojan in disguise: PDF editor backdoor
The “AppSuite PDF Editor” poses as a legit tool but is a backdoor: most of its code supports malware functions, including C2 comms, scheduled tasks, and AES-encrypted data exfiltration.
Persistence is full, cleanup needs system repave.…
Hijack-as-a-Service: Abusing Azure Bastion Shareable Links for Phishing and Stealthy Persistence.
Check out my recent research about Azure Bastion and see how it can be used to phish users and achieve stealthy persistence.
medium.com/@matanb707/hij…#Persistence#Stealth#Phishing
Breaking MS Defender telemetry with DNS blackholing.
An old trick to blind the sensor - adding a new record in hosts file to redirect cloud-based entity to localhost.
A nice post by Elli Shlomo (@ellishlomo).
Source: cyberdom.blog/ghosting-the-s…#redteam#blueteam#maldev…
Hosts running the WebClient service are prime targets for NTLM relay attacks, and it may be possible to start the service remotely as a low-privileged user.
@0xthirteen breaks down the service startup mechanics, plus the protocols and technologies. ghst.ly/41QT7GW
🚨 I am publishing my research on the File System API. FileJacking might used to establish Initial Access.
Key points:
- File smuggling via File System API
- Backdooring files directly from a browser
- Reading / creating folders and files from a browser
print3m.github.io/blog/filejacki…
[Research] Starting Chrome Exploitation with Type Confusion 101 ^-^☆ Part 2.(EN)
hackyboiz.github.io/2025/07/30/OUY…
Hello, this is OUYA77. Type Confusion 101 Part 2 is now ready. In this part, I’ve prepared an explanation of what Type Confusion is, why it occurs, and how it differs in…
A proof of concept to deliver a binary payload via an X.509 TLS certificate. The client extracts the payload from the certificate and executes it. github.com/jeanlucdupont/…
My first @SpecterOps blog!
Ever wanted to collect Active Directory information from LDAP for a Red Team?
Using LDAP's more OPSEC-considerate cousin: ADWS can be used to improve upon the already present advantages of using smaller-scaling LDAP queries.
specterops.io/blog/2025/07/2…
Free Offensive and Defensive Courses
AV/EDR Evasion Practical Techniques
Foundations of Log Analysis for Cyber Defense
Fundamentals of Game Hacking Development
Introduction to Bug Bounty
Introduction to Offensive Security with Artificial Intelligence
Introduction to Python for…
LudusHound - a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing. github.com/bagelByt3s/Lud…
Sometimes, SQL injection is still possible, even when prepared statements are being used. Our researcher @hash_kitten has written up a blog post about a novel technique for SQL Injection in PDO’s prepared statements: slcyber.io/assetnote-secu…
GitHub - OTRF/ThreatHunter-Playbook: A community-driven, open-source project to share detection logic, adversary tradecraft and resources to make detection development more efficient. github.com/OTRF/ThreatHun…
🚨 #DeerStealer Delivered via Obfuscated .LNK and #LOLBin Abuse.
A new phishing campaign delivers #malware through a fake PDF shortcut (Report.lnk) that leverages mshta.exe for script execution, which is a known LOLBin technique (MITRE T1218.005).
⚠️ The attack begins with an…
Rust for Malware development
bishopfox.com/blog/rust-for-…
TL;DR: This blog explores the advantages of using Rust over C for malware development, highlighting Rust's evasive characteristics and challenges for reverse engineering.
884 Followers 1K Following2x Founder @VoltAI & @Hackmetrix, Security Researcher. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker. I love vibe coded shit.
3 Followers 174 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/vOdpis6298
3K Followers 718 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
8K Followers 6K Following#InfoSec professional, husband & father of two (in random order). #BlueTeam #DFIR #APT #CTI #RedTeaming #BSidesZH (RT/Likes ≠ endorsement) 👀➡️#MalwareChallenge
33 Followers 530 FollowingWelcome to explore https://t.co/COLwPujJYs, our threat intelligence platform. happy to see you joining us and talking about how to protect your business from threats.
9K Followers 333 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
884 Followers 1K Following2x Founder @VoltAI & @Hackmetrix, Security Researcher. D̶o̶n̶’̶t̶ have the drive to become a big scary famous hacker. I love vibe coded shit.
129K Followers 60 FollowingProviding Cyber Threat Intelligence from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threat Alerts & more. https://t.co/Fi7VW9lg94
3K Followers 718 FollowingMicrosoft Certified Master (MCM): Active Directory.
Previously AD field engineer at Microsoft.
Notes from the field & the lab (@duff22b)
859 Followers 111 FollowingWelcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field
5K Followers 1 FollowingI'm not using this Twitter account anymore. Don't trust it. My new Twitter = @zebleerguy & you can verify that on my website and Telegram
12K Followers 24 FollowingAn annual awards ceremony celebrating and making fun of the achievements and failures of security researchers and the wider security community.
5K Followers 315 FollowingSecurity but not as in "national security". Playing CTFs with @redrocket_ctf (and @Sauercl0ud). Pwn2Own Vancouver 2020..=2024\{2023}. @[email protected]
342K Followers 48 FollowingOne of the most widely read and trusted cybersecurity news sites, providing IT security professionals informed insights into the latest news and trends.
2K Followers 540 FollowingBuilding valuable, hands-on learning experiences for 2000+ #cybersecurity specialists from all over the world.
Join us to educate, secure & change the world!
9K Followers 2K FollowingThreat Researcher | Co-Host of Atomics on a Friday | LOLDrivers & Atomic Red Team Maintainer | I'm Everywhere and Nowhere - BSG.
223K Followers 6K FollowingFounder @Binary_Defense @TrustedSec Co-Owner https://t.co/HQC75WhdJh. @WeHackHealth Pod. God + Family/Hacker/CSO/USMC/Intel/Fitness. Make the world a better place.
1K Followers 350 FollowingJust your friendly neighborhood APT :~# OSCE³ ℹ️Opinions are my own and not the views of my employer. 📌I’ll be at @BSidesTirana 2026 with @IAMCOMPROMISED