Aurélien Chalot (@defte_) 's Twitter Profile
Aurélien Chalot

@defte_

Hacker, sysadmin and security researcher @OrangeCyberdef 💻
Calisthenic enthousiast 💪 and wannabe philosopher t.ly/9NPk0 📖
🔥 Hide&Sec 🔥

ID: 934863293625270273

linkhttps://blog.whiteflag.io calendar_today26-11-2017 19:15:52

1,1K Tweet

3,3K Followers

452 Following

Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Adriaan was struggling to get an interactive shell on the *nix application server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup & code 👇🧵

Adriaan was struggling to get an interactive shell on the *nix application server he had popped, so he wrote a turn-based mini binary to give you a semi-interactive shell in restrictive environments. Writeup & code 👇🧵
BlackWasp (@blwasp_) 's Twitter Profile Photo

Some weeks ago, TrustedSec has posted a really interesting blog post about the MDT shares, and credentials that can be found inside. But one question remained unanswered: where are they? I have tried to answer this question: hideandsec.sh/books/windows-…

Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (Aurélien Chalot), including instructions for reproducing the test environment yourself. (link below)

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (<a href="/Defte_/">Aurélien Chalot</a>), including instructions for reproducing the test environment yourself.

(link below)
Aurélien Chalot (@defte_) 's Twitter Profile Photo

Last month I spent hours implementing Channel Binding for MSSQLClient on Impacket. If you are interested in how CBT is computed, handling STARTTLS in python, TLS introspection on Windows or simply MSSQL databases check it out sensepost.com/blog/2025/a-jo… :)

hashcat (@hashcat) 's Twitter Profile Photo

hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: hashcat.net/forum/thread-1…

hashcat v7.0.0 released! 

After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. 

Detailed writeup is available here: hashcat.net/forum/thread-1…
Wil (@wil_fri3d) 's Twitter Profile Photo

gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP… It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.