0xbad53c (@0xbad53c) 's Twitter Profile
0xbad53c

@0xbad53c

Red Team Operations lead at DXC Strikeforce

ID: 1331199830572621824

linkhttps://red.0xbad53c.com calendar_today24-11-2020 11:35:56

69 Tweet

252 Takipçi

170 Takip Edilen

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Day 2 of "Operational Purple Teaming for Defenders" was intense! 🚀🔍 Our red team instructor ramped up APT 0x00, while our blue team instructor guided us through anomaly detection and investigating IoCs. We crushed advanced threat hunting and detection engineering! 💥👨‍🏫 Shout

Day 2 of "Operational Purple Teaming for Defenders" was intense! 🚀🔍 Our red team instructor ramped up APT 0x00, while our blue team instructor guided us through anomaly detection and investigating IoCs. We crushed advanced threat hunting and detection engineering! 💥👨‍🏫 
Shout
/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Operational Purple Teaming for Defenders Day 3 with 0xbad53c and Thomas Eugène - let the fun begin! #hacking #redteam #blueteam #battle

Operational Purple Teaming for Defenders Day 3 with <a href="/0xbad53c/">0xbad53c</a> and Thomas Eugène - let the fun begin!

#hacking #redteam #blueteam #battle
0xbad53c (@0xbad53c) 's Twitter Profile Photo

we just wrapped up our Operational Purple Teaming For Defenders #training! It was awesome to share this experience with several #BlueTeam and #RedTeam professionals! Thanks for hosting us /ˈziːf-kɒn/! #PurpleTeam #cybersecurity #infosec #informationsecurity

we just wrapped up our Operational Purple Teaming For Defenders #training! It was awesome to share this experience with several #BlueTeam and #RedTeam professionals!  Thanks for hosting us <a href="/x33fcon/">/ˈziːf-kɒn/</a>! 
#PurpleTeam #cybersecurity #infosec #informationsecurity
0xbad53c (@0xbad53c) 's Twitter Profile Photo

As a way of giving back to the #RedTeam community, our intern, Giiker, published his Ansible playbook to deploy SpecterOps #Nemesis. github.com/DXC-StrikeForc… He also extended the default Cobalt Strike connector to parse Mimikatz output: github.com/SpecterOps/Nem… #infosec

BruCON (@brucon) 's Twitter Profile Photo

Combat APT 0x00 in the 3-day Operational Purple Teaming for Defenders Training at #BruCON0x10. Experience a realistic cyberattack from the #BlueTeam point of view to gain a deeper understanding of threat actor techniques and detection strategies. brucon.org/2024/brucon-20…

Combat APT 0x00 in the 3-day Operational Purple Teaming for Defenders Training at #BruCON0x10. Experience a realistic cyberattack from the #BlueTeam point of view to gain a deeper understanding of threat actor techniques and  detection strategies. brucon.org/2024/brucon-20…
BruCON (@brucon) 's Twitter Profile Photo

Check out our #BruCON0x10 training (16-18 September) promo video ! It contains an overview of all our courses and 4 (actually 5!) reasons why you should join us in September. brucon.org/2024/brucon-20…

0xbad53c (@0xbad53c) 's Twitter Profile Photo

Combat APT 0x00 and sharpen your Threat Hunting and Detection Engineering skills in our Operational Purple Teaming For Defenders #Training at BruCON! #RedTeam #BlueTeam #infosecurity #PurpleTeam

BruCON (@brucon) 's Twitter Profile Photo

One #BruCON0x10 course is already sold out and others are close to their maximum. Don't wait too long to register for your favorite course! brucon.org/2024/brucon-20…

0xbad53c (@0xbad53c) 's Twitter Profile Photo

Long overdue, decided to push my Dockerfiles for cross-compiling for Windows with mingw-w64 on Apple Silicon. Totally forgot to git push. I hope it's still useful to someone. github.com/0xbad53c/docke… hub.docker.com/repository/doc…

0xbad53c (@0xbad53c) 's Twitter Profile Photo

While we're at it, here's my approach to statically compile #Nmap. Can be used in CI/CD in case you would like to build and e.g. obfuscate your own static Nmap binary. github.com/0xbad53c/docke… hub.docker.com/repository/doc…

BruCON (@brucon) 's Twitter Profile Photo

You have till tomorrow 5PM to register for one of the #BruCON0x10 courses. brucon.org/2024/brucon-20… It is also the only way that you can still secure a conference ticket ! #HackingForBeer

0xbad53c (@0xbad53c) 's Twitter Profile Photo

In 2023, I discovered a critical unauthenticated Remote Code Execution (#RCE) vulnerability in HPE Cluster Management Utility (CMU), while analysing source code. After more than two years, this issue has finally been assigned CVE-2024-13804. red.0xbad53c.com/vulnerability-…

0xbad53c (@0xbad53c) 's Twitter Profile Photo

The TROOPERS Conference training is now sold out but you can still catch our 4-day Operational Purple Teaming For Defenders at Black Hat #BHUSA in August! blackhat.com/us-25/training…

0xbad53c (@0xbad53c) 's Twitter Profile Photo

Excited to bring our Operational Purple Teaming for Defenders training to 🇧🇪BruCON again! This hands-on course bridges red & blue, empowering defenders with offensive insights to level up detection & response. Join us: pretix.eu/brucon/pj9ta-2/ #PurpleTeam #Cybersecurity #BruCON

BruCON (@brucon) 's Twitter Profile Photo

The #BruCON0x11 training program (22-24 Sept) has been published! 9 courses covering AI, hardware hacking, exploit development, social engineering, threat modeling, cloud, MacOS and red, blue or purple teaming. Early-bird prices till end of the month ! brucon.org/training

The #BruCON0x11 training program (22-24 Sept) has been published! 9 courses covering AI, hardware hacking, exploit development, social engineering, threat modeling, cloud, MacOS and red, blue or purple teaming. Early-bird prices till end of the month ! brucon.org/training
BruCON (@brucon) 's Twitter Profile Photo

Looking for an affordable, high-quality and engaging cybersecurity course? Check out the #BruCON0x11 training program (22-24 Sept). Choose from 9 red, blue or purple courses with early-bird pricing available until the end of the month! brucon.org/training #HackingForBeer

Looking for an affordable, high-quality and engaging cybersecurity course? Check out the #BruCON0x11 training program (22-24 Sept). Choose from 9 red, blue or purple courses with early-bird pricing available until the end of the month! brucon.org/training #HackingForBeer