Scoubi (@scoubimtl) 's Twitter Profile
Scoubi

@scoubimtl

InfoSec, Threat Hunting, Detection Engineering, DFIR and some personal stuff.

ID: 19666315

linkhttp://www.github.com/scoubi calendar_today28-01-2009 18:20:39

2,2K Tweet

2,2K Takipçi

252 Takip Edilen

Scoubi (@scoubimtl) 's Twitter Profile Photo

If you like #DetectionEngineering and #ThreatHunting, #DEATHcon is for you! 2 days of hands on workshops with other like minded professional. Come learn with your peers in #Montreal! See below for ticket information. 10 tickets left! (Please retweet for reach)

Scoubi (@scoubimtl) 's Twitter Profile Photo

Yesterday I ordered sticker for the first time in my life. I choose Sticker Mule because I've seen people recommending them in the past. I was really amazed by their responsiveness to adjust the mocks (about 10 minutes!!) and inquiry about order modification. 10/10 will use again

SpecterOps (@specterops) 's Twitter Profile Photo

Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm

HD Moore (@hdmoore) 's Twitter Profile Photo

Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: runzero.com/blog/introduci…

Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: runzero.com/blog/introduci…
Scoubi (@scoubimtl) 's Twitter Profile Photo

#DEATHcon Montreal is a wrap! Thank you to everyone who attended, created content and helped in the shadows. Here’s a few pictures of our Happy Hour on Saturday and of Day 2 (I forgot to take pictures of Day 1 🤦)!!

#DEATHcon Montreal is a wrap!

Thank you to everyone who attended, created content and helped in the shadows. 

Here’s a few pictures of our Happy Hour on Saturday and of Day 2 (I forgot to take pictures of Day 1 🤦)!!
SpecterOps (@specterops) 's Twitter Profile Photo

It's Friday so you know what time it is! #BloodHoundBasics with Scoubi Most of you are now familiar with #BloodHound #OpenGraph. You might even be aware that we have a Library page bloodhound.specterops.io/opengraph/libr… for all the "Hounds" created by Specters & the Community. 🧵: 1/3

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Wonka - a sweet Windows tool that extracts Kerberos tickets from the Local Security Authority (LSA) cache github.com/Shac0x/Wonka

Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ (@yo_yo_yo_jbo) 's Twitter Profile Photo

This blogpost is interesting - has Windows internals, my own novel solution to a problem red teamers have had for a while, EDR bypasses, debugging and much more. Spoofing command lines on Windows and solving the problem of length limitations: github.com/yo-yo-yo-jbo/c…

This blogpost is interesting - has Windows internals, my own novel solution to a problem red teamers have had for a while, EDR bypasses, debugging and much more.
Spoofing command lines on Windows and solving the problem of length limitations:
github.com/yo-yo-yo-jbo/c…
Dr. Nestori Syynimaa (@drazuread) 's Twitter Profile Photo

I noticed that BruCON talks are published in Youtube, including my "Epic" talk on Entra ID Token Theft Protections! Besides the technical part, by watching the talk you'll learn: ✅ How to survive live-only-demo-talk when network isn't working 🥵 ✅ How to reveal your demo

I noticed that <a href="/brucon/">BruCON</a> talks are published in Youtube, including my "Epic" talk on Entra ID Token Theft Protections! 

Besides the technical part, by watching the talk you'll learn:
✅ How to survive live-only-demo-talk when network isn't working 🥵
✅ How to reveal your demo
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

PrivKit - a simple beacon object file that detects privilege escalation vulnerabilities caused by misconfigurations on Windows OS github.com/nickvourd/Priv…

Scoubi (@scoubimtl) 's Twitter Profile Photo

I'm happy to share a new #BloodHound #OpenGraph extension with the commnunity!! Here's the link : github.com/Scoubi/BloodSO… It maps #MITRE ATT&CK. #Sigma and #AtomicRedTeam test all in one graph! More details in the README of the repo!

SpecterOps (@specterops) 's Twitter Profile Photo

Ghostwriter v6.1 is out! 🐕 Full BloodHound integration 📝 Collaborative project notes 📑 Improved caption editor 🌙 Dark mode support 🔐 SSO/MFA & usability upgrades ʎppɐɯɔ breaks down how 6.1 streamlines assessment + reporting. ⬇️ ghst.ly/gwv61-tw

IT Guy (@t3chfalcon) 's Twitter Profile Photo

Did You Know? Uninstalling an app doesn't delete the proof that you ran it. Windows keeps a Ghost File for every program you execute to speed up loading times. It’s called Prefetch. Located in C:\Windows\Prefetch, these .pf files log: The exact Date & Time you ran it. The

Did You Know?

Uninstalling an app doesn't delete the proof that you ran it.

Windows keeps a Ghost File for every program you execute to speed up loading times.

It’s called Prefetch.

Located in C:\Windows\Prefetch, these .pf files log:
The exact Date &amp; Time you ran it.

The
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

CLR-Unhook - A native C++ utility that bypasses EDR/AV hooks in the .NET Common Language Runtime by restoring the original nLoadImage function implementation github.com/hwbp/CLR-Unhook