Mayfly (@m4yfly) 's Twitter Profile
Mayfly

@m4yfly

Former Dev and DevOps|
Pentester and red teamer at orange cyberdefense |
OSCE³|
Tweet are my own|
discord: m4yfly

ID: 931064592737996800

linkhttps://mayfly277.github.io/ calendar_today16-11-2017 07:41:12

531 Tweet

6,6K Takipçi

778 Takip Edilen

Mayfly (@m4yfly) 's Twitter Profile Photo

📩 Exchange Exploitation - Part 1 (Without Credentials) Explore Exchange exploitation in Game of Active Directory and learn about attacks without valid credentials. mayfly277.github.io/posts/Exchange…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to Dylan Tran and chompie for all their contributions to Loki C2! IBM IBM Security X-Force securityintelligence.com/x-force/bypass…

guilhem rioux (@guilhemrioux) 's Twitter Profile Photo

Glad to publish a blog post on a critical vulnerability I found some months ago on GLPI, that impacts all default installation under a certain version: sensepost.com/blog/2025/leak… We also released a tool that implements some check for known vulnerabilities: github.com/Orange-Cyberde…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

SpecterOps (@specterops) 's Twitter Profile Photo

New blog post just dropped! 🙌 Read the latest from Matt Creel on how an operator can perform situational awareness steps prior to making an Entra ID token request and how tokens can be effectively used once obtained. ghst.ly/4lA5Iqu

Aurélien Chalot (@defte_) 's Twitter Profile Photo

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D Blogpost: sensepost.com/blog/2025/is-t… Tool: github.com/fortra/impacke… And also, big thanks to jmk (Joe Mondloch) for the collab' :D!

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D

Blogpost: sensepost.com/blog/2025/is-t…
Tool: github.com/fortra/impacke…

And also, big thanks to jmk (Joe Mondloch) for the collab' :D!
Andrea Pierini (@decoder_it) 's Twitter Profile Photo

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
Hack'n Speak (@hacknspeak) 's Twitter Profile Photo

🇫🇷🎙️Nouvel épisode du podcast Hack'n Speak accompagné de Shadow_gatt 🔥 On aborde le sujet du redteam, des missions, un retour d'expérience pertinent avec un supplément anecdotes ! Bonne écoute à toutes et à tous 🎶 creators.spotify.com/pod/profile/ha…

Check Point Research (@_cpresearch_) 's Twitter Profile Photo

Zero-Day used by Stealth Falcon APT group in a spear-phishing campaign: 💥 .URL file exploitation (assigned CVE-2025-33053) 🧰 Custom Mythic implants, LOLBins, and custom payloads 🌍 High-profile targets across the Middle East and Africa research.checkpoint.com/2025/stealth-f…

RedTeam Pentesting (@redteampt) 's Twitter Profile Photo

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live: 🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos: blog.redteam-pentesting.de/2025/reflectiv…

Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

SkelSec (@skelsec) 's Twitter Profile Photo

Well, it happened. The company I worked at for 6 years will be closing and thus I got laid off. This doesn't affect Octopwn operations in any negative ways, but I'm actively looking for a new day job. If someone has something please DM me. Retweets are appreciated.

Bad Sector Labs (@badsectorlabs) 's Twitter Profile Photo

Ludushound shows the power of community driven innovation in cybersecurity. Beyviel David created an awesome tool to convert bloodhound data into a working lab in 🏟️ Ludus. Replicate complex live environments with automation - and get back to the fun stuff! specterops.io/blog/2025/07/1…

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

It's been almost a year since my last blog... So, here is a new one: Extending AD CS attack surface to the cloud with Intune certificates. Also includes ESC1 over Intune (in some cases). dirkjanm.io/extending-ad-c… Oh, and a new tool for SCEP: github.com/dirkjanm/scepr…

Steven (@0xthirteen) 's Twitter Profile Photo

I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it specterops.io/blog/2025/08/1…