Tract0r (@tract0r_) 's Twitter Profile
Tract0r

@tract0r_

Offensive Security
Windows Intrernals
Active Directory
Initial Access
Malware Dev

ID: 548239876

calendar_today08-04-2012 07:49:44

2,2K Tweet

266 Followers

158 Following

Octoberfest7 (@octoberfest73) 's Twitter Profile Photo

Very proud of this. You can run arbitrary BOFs through Beacon and every API call will have a fully backed stack without needing to modify or recompile them.

Very proud of this. You can run arbitrary BOFs through Beacon and every API call will have a fully backed stack without needing to modify or recompile them.
NetSPI (@netspi) 's Twitter Profile Photo

Beacon Object Files (BOFs) in C2 platforms limit developers. ow.ly/rQ2e50VjZBU Read NetSPI's blog post to explore a reference design for a new BOF portable executable (PE) concept that bridges the gap between modern C++ development and memory-executable C2 integration.

Beacon Object Files (BOFs) in C2 platforms limit developers. ow.ly/rQ2e50VjZBU 

Read NetSPI's blog post to explore a reference design for a new BOF portable executable (PE) concept that bridges the gap between modern C++ development and memory-executable C2 integration.
Oddvar Moe (@oddvarmoe) 's Twitter Profile Photo

Ever wondered if the user is active or not on a red team? Well, I created a bof called useridletime found in github.com/trustedsec/CS-โ€ฆ that you can use to query for idle time of the user. Useful in some scenarios ๐Ÿ˜‰

Mr.Z (@zux0x3a) 's Twitter Profile Photo

ZigStrike 2.0 is out! I have released a new version of ZigStrike to address several issues from the previous release and add more techniques and UI enhancements, read more below :

ZigStrike 2.0 is out!
I have released a new version of ZigStrike to address several issues from the previous release and add more techniques and UI enhancements, read more below :
Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop ๐ŸคŸ ibm.com/think/x-force/โ€ฆ

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

As this is public now - an alternative to modifying AppIds to make them use the interactive user via the remote registry you can also use a lot of existing CLSIDs which have the interactive user configured and coerce an incoming RPC authentication from loggedon users.๐Ÿ˜Ž

As this is public now - an alternative to modifying AppIds to make them use the interactive user via the remote registry you can also use a lot of existing CLSIDs which have the interactive user configured and coerce an incoming RPC authentication from loggedon users.๐Ÿ˜Ž
NetSPI (@netspi) 's Twitter Profile Photo

Microsoft patched critical vulnerabilities (CVE-2025-21299, CVE-2025-29809) in Q1 2025. NetSPI research reveals Kerberos canonicalization bypasses Hyper-V isolation of credentials, compromising Windows security. Read the full article: ow.ly/WcuW50VAOTg

Microsoft patched critical vulnerabilities (CVE-2025-21299, CVE-2025-29809) in Q1 2025. 

NetSPI research reveals Kerberos canonicalization bypasses Hyper-V isolation of credentials, compromising Windows security.

Read the full article: ow.ly/WcuW50VAOTg
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - Sh3lldon/FullBypass: A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell. github.com/Sh3lldon/FullBโ€ฆ

๐™ ๐™€ ๐™‡ ๐™„ ๐™“ ๐™ˆ (@felixm_pw) 's Twitter Profile Photo

With some guidance from DebugPrivilege I've found a way to easily dump clear text implants even while they sleep. Bad day for sleep obfuscation ๐Ÿ’ค blog.felixm.pw/rude_awakeningโ€ฆ

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

Blogpost from my colleague about whatโ€™s still possible with recently published COM/DCOM toolings, Cross Session Activation and Kerberos relaying ๐Ÿ”ฅ r-tec.net/r-tec-blog-winโ€ฆ

noodlearms (@infosecnoodle) 's Twitter Profile Photo

Short post on an alternative method for obtaining Microsoft Entra refresh tokens via Beacon. Proof of concept BOF is available on my GitHub ๐Ÿ™‚ infosecnoodle.com/p/obtaining-miโ€ฆ

MSec Operations (@msecops) 's Twitter Profile Photo

The Ruy-Lopez technique sometimes helps a lot with evasion. The technique was published and open sourced by our founder @Shitsecure two years ago. In #RustPack version 1.3.1 we added a custom, non-public version of this technique that is much more OPSec safe than the public

MalDev Academy (@maldevacademy) 's Twitter Profile Photo

Utilizing our previously discovered registry key to hook LSASS's SamIGetUserLogonInformation2 API and capturing plaintext login credentials. github.com/Maldev-Academyโ€ฆ

Utilizing our previously discovered registry key to hook LSASS's SamIGetUserLogonInformation2 API and capturing plaintext login credentials.

github.com/Maldev-Academyโ€ฆ
CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Yes, we're beating a dead horse. But that horse still runs in corporate networks - and quietly gives attackers the keys to the kingdom. We're publishing whatโ€™s long been exploitable. Time to talk about it. #DSM #Ivanti code-white.com/blog/ivanti-deโ€ฆ

mpgn (@mpgn_x64) 's Twitter Profile Photo

Thanks to the awesome work of Aleem Ladha , the CTF Windows Active Directory lab for Barbhack from 2024 is now public! ๐Ÿ”ฅ You can build the lab and pwn the ADโ€”13 flags to capture! No public write-up exists yetโ€”waiting for someone to submit one! github.com/Pennyw0rth/Netโ€ฆ

David Hendrickson (@teksedge) 's Twitter Profile Photo

Many are asking why Microsoft's announcement of MCP for Windows OS is significant. Windows OS is now AI-agent accessible. Take a look at this ex. AI-OS. Replace LLM System Call Interface with Microsoft's new Windows OS MCP. The world's most used OS is now AI agent accessible.

Many are asking why Microsoft's announcement of MCP for Windows OS is significant.  Windows OS is now AI-agent accessible. Take a look at this ex. AI-OS. Replace LLM System Call Interface with Microsoft's new Windows OS MCP. The world's most used OS is now AI agent accessible.
Back Engineering Labs (@backengineerlab) 's Twitter Profile Photo

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version. Simply sign

Given the recent events with VMPSoft DMCA'ing educational YouTube videos demonstrating how to unpack malware protected with VMProtect, we have decided to release a free to use unpacker which works for all versions of VMP 3.x including the most recent version.

Simply sign
Altered Security (@alteredsecurity) 's Twitter Profile Photo

Congratulations to Tract0r for clearing our Certified by Altered Security Red Team Expert for Azure exam! #CARTE #AlteredSecurity cc Nikhil Mittal alteredsecurity.com/azureadvanced

Congratulations to <a href="/Tract0r_/">Tract0r</a> for clearing our Certified by Altered Security Red Team Expert for Azure exam!
#CARTE #AlteredSecurity cc <a href="/nikhil_mitt/">Nikhil Mittal</a>

alteredsecurity.com/azureadvanced
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

๐Ÿš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it ๐Ÿคทโ€โ™‚๏ธ Read Here - akamai.com/blog/security-โ€ฆ

๐Ÿš€ We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it ๐Ÿคทโ€โ™‚๏ธ
Read Here - akamai.com/blog/security-โ€ฆ