MDSec (@mdseclabs) 's Twitter Profile
MDSec

@mdseclabs

Consultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | mdsec.co.uk | nighthawkc2.io

ID: 334002593

linkhttps://www.mdsec.co.uk calendar_today12-07-2011 12:36:48

1,1K Tweet

14,14K Followers

0 Following

Rich Warren (@buffaloverflow) 's Twitter Profile Photo

Wow, #RedTreat was a blast! Was amazing to see such high quality Red Team focused content & research being shared! ๐Ÿ”ฅ Enjoyed meeting everyone and putting faces to names/handles too! ๐Ÿ‘‹ Great job and thanks to MDSec & Outflank for organising! ๐Ÿ‘๐Ÿ’ฏ๐Ÿ๏ธ

Wow, #RedTreat was a blast!

Was amazing to see such high quality Red Team focused content & research being shared! ๐Ÿ”ฅ

Enjoyed meeting everyone and putting faces to names/handles too! ๐Ÿ‘‹

Great job and thanks to <a href="/MDSecLabs/">MDSec</a> &amp; <a href="/OutflankNL/">Outflank</a> for organising! ๐Ÿ‘๐Ÿ’ฏ๐Ÿ๏ธ
XSS Payloads (@xsspayloads) 's Twitter Profile Photo

When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls, a good compilation of evasion techniques by MDSec mdsec.co.uk/2024/10/when-wโ€ฆ

Clint Gibler (@clintgibler) 's Twitter Profile Photo

๐Ÿ˜ˆ Common Detection & Evasion Techniques for Web Application Firewalls โ†’ Fuzzing, reversing regex rules, obfuscation/encoding, alternative character sets, request header spoofing + Real-world case studies of bypassing CloudFront, Cloudflare, F5 BIG-IP ASM, and Azure

MDSec (@mdseclabs) 's Twitter Profile Photo

Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers nighthawkc2.io/evanesco/ #happythanksgiving

Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers nighthawkc2.io/evanesco/ #happythanksgiving
MDSec (@mdseclabs) 's Twitter Profile Photo

Ever come across Altiris on a red team? We did.... Check out this post from Matt Johnson on how to extract ACC creds... Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris) mdsec.co.uk/2024/12/extracโ€ฆ

Ever come across Altiris on a red team? We did.... Check out this post from <a href="/breakfix/">Matt Johnson</a> on how to extract ACC creds... Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris)
mdsec.co.uk/2024/12/extracโ€ฆ
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I'm not doing training at BH USA this year, but some friends are and I highly recommend their courses: - Adv Detection Engineering by FalconForce Official - Building AI agents by Roberto Rodriguez ๐Ÿ‡ต๐Ÿ‡ช - Adversary Simulation by MDSec And ofc the awesome courses by SpecterOps folks!

Dominic Chell ๐Ÿ‘ป (@domchell) 's Twitter Profile Photo

Last year's Black Hat was a blast so we're doing it all again! Join me and the @MDSeclabs crew in Vegas. Early bird discounts are now available. blackhat.com/us-25/trainingโ€ฆ

Last year's <a href="/BlackHatEvents/">Black Hat</a> was a blast so we're doing it all again! Join me and the @MDSeclabs crew in Vegas. Early bird discounts are now available. blackhat.com/us-25/trainingโ€ฆ
โœž inversecos (@inversecos) 's Twitter Profile Photo

NEW LAB: Mustang Panda ๐Ÿผ๐Ÿ” Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC Test your blue team skills on ๐Ÿ‘€ .NET malware ๐Ÿ‘€ DLL Sideloading ๐Ÿ‘€ Webshells ๐Ÿ‘€ Procdumps Lab Contributors Adversarial Emulation: MDSec ali ๐Ÿ•ท๏ธ

NEW LAB: Mustang Panda ๐Ÿผ๐Ÿ”

Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC

Test your blue team skills on
๐Ÿ‘€ .NET malware
๐Ÿ‘€ DLL Sideloading
๐Ÿ‘€ Webshells 
๐Ÿ‘€ Procdumps

Lab Contributors
Adversarial Emulation: <a href="/MDSecLabs/">MDSec</a>  <a href="/offensiveninja/">ali ๐Ÿ•ท๏ธ</a>
โœž inversecos (@inversecos) 's Twitter Profile Photo

The Council of Tropical Affairs, while negotiating the mango export deal, have noticed suspicious activity on their network, specifically involving unauthorized access to shared documents. We have provided process dumps, disk images, SIEM access, and results from YARA outputs

The Council of Tropical Affairs, while negotiating the mango export deal, have noticed suspicious activity on their network, specifically involving unauthorized access to shared documents.

We have provided process dumps, disk images, SIEM access, and results from YARA outputs
XINTRA (@xintraorg) 's Twitter Profile Photo

Already three people have fully smashed the Mustang Panda lab with FULL points (zero hints used) over the weekend by MDSec and Zach Just sharing some more feedback we got on the lab ๐Ÿ’ช

Already three people have fully smashed the Mustang Panda lab with FULL points (zero hints used) over the weekend by <a href="/MDSecLabs/">MDSec</a> and <a href="/svch0st/">Zach</a> 

Just sharing some more feedback we got on the lab ๐Ÿ’ช
MDSec (@mdseclabs) 's Twitter Profile Photo

Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by Tim mdsec.co.uk/2025/03/red-teโ€ฆ

Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by <a href="/__invictus_/">Tim</a> mdsec.co.uk/2025/03/red-teโ€ฆ
Dominic Chell ๐Ÿ‘ป (@domchell) 's Twitter Profile Photo

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch ๐Ÿ™ MDSec

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch ๐Ÿ™ <a href="/MDSecLabs/">MDSec</a>
0patch (@0patch) 's Twitter Profile Photo

We'd like to thank our sources researching various NTLM hash leak issues: 1) Dominic Chell ๐Ÿ‘ป of MDSec: mdsec.co.uk/2021/02/farminโ€ฆ 2) Yorick Koster of Securify: securify.nl/en/blog/livingโ€ฆ 3) Alex: swepstopia.com/url-file-attacโ€ฆ

Smukx.E (@5mukx) 's Twitter Profile Photo

I have done Parallel syscall technique in Rust. github.com/Whitecat18/Rusโ€ฆ Inspired by MDSec Research. #research #poc #rust

I have done Parallel syscall technique in Rust.

github.com/Whitecat18/Rusโ€ฆ

Inspired by <a href="/MDSecLabs/">MDSec</a>  Research. 

#research #poc #rust