Atsika (@_atsika) 's Twitter Profile
Atsika

@_atsika

Red Team enthusiast | Malware development enjoyer | Adversary Simulation at @quarkslab

ID: 1254464685883248640

calendar_today26-04-2020 17:37:50

2,2K Tweet

505 Takipçi

469 Takip Edilen

Bobby Cooke (@0xboku) 's Twitter Profile Photo

⚡️ Loki C2 just leveled up! 🍄🧙‍♂️ 🔗 Agents can now link to each other, and across platforms! 🔗 No internet? No problem. Chain them, pivot deep, and keep moving! X-Force IBM IBM Security Check out the new release here: github.com/boku7/Loki

⚡️ Loki C2 just leveled up! 🍄🧙‍♂️
🔗 Agents can now link to each other, and across platforms! 🔗
No internet? No problem.
Chain them, pivot deep, and keep moving!
<a href="/XForce/">X-Force</a> <a href="/IBM/">IBM</a> <a href="/IBMSecurity/">IBM Security</a> 
Check out the new release here: github.com/boku7/Loki
BallisKit (@balliskit) 's Twitter Profile Photo

DLL injection and DLL proxying on macOS? Yes it is possible! Checkout this blog by Antoine about macOS automated DYLIB injection! #redteam blog.balliskit.com/macos-dylib-in…

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Get ready for an epic #x33fcon 2025 workshop in Gdynia, Poland (June 12-13) by Duncan Ogilvie 🍍, a hands-on, intermediate-level session where you’ll build a custom VM using RISC-V and LLVM to obfuscate payloads, evade detections, and harden against reverse engineering. Craft field-ready

Get ready for an epic #x33fcon 2025 workshop in Gdynia, Poland (June 12-13) by <a href="/mrexodia/">Duncan Ogilvie 🍍</a>, a hands-on, intermediate-level session where you’ll build a custom VM using RISC-V and LLVM to obfuscate payloads, evade detections, and harden against reverse engineering. Craft field-ready
Yuval Gordon (@yug0rd) 's Twitter Profile Photo

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…
Sean Heelan (@seanhn) 's Twitter Profile Photo

I wrote-up how I used o3 to find CVE-2025-37899, a remote zeroday vulnerability in the Linux kernel’s SMB implementation. Link to the blog post below 👇

Sarah Young (@_sarahyo) 's Twitter Profile Photo

Okay so this is HUGE - our amazing AI red team have open sourced their AI red team labs so you can set up your own training! aka.ms/AIRTlabs Ram Shankar Siva Kumar

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

Melvin langvik (@flangvik) 's Twitter Profile Photo

It’s been a while since I made a video🫥, so here’s one looking at LDAPx by Artur Marzano , which is based on the amazing research present last year by Sabi and Daniel Bohannon youtu.be/GZ7Vbvf2Dso

BallisKit (@balliskit) 's Twitter Profile Photo

A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce, and more will be released soon! Also, after Sliver, we a preparing tutorials with Mythic Apollo and Havoc 😎 #redteam

A new version of MacroPack Pro with improved DotNET obfuscator, new shellcode launcher, improved clickonce,  and more will be released soon! Also, after Sliver, we a preparing  tutorials with Mythic Apollo and Havoc 😎

#redteam
HackerRalf (@hacker_ralf) 's Twitter Profile Photo

AdaptixC2 v0.5 is out github.com/Adaptix-Framew… * Windows "gopher" agent * Fast socks5 tunnels via "gopher" agent * Remote Terminal * Client side tunnels More details in the changelog: adaptix-framework.gitbook.io/adaptix-framew…

AdaptixC2 v0.5 is out

github.com/Adaptix-Framew…

* Windows "gopher" agent
* Fast socks5 tunnels via "gopher" agent
* Remote Terminal
* Client side tunnels

More details in the changelog: adaptix-framework.gitbook.io/adaptix-framew…
Matt Ehrnschwender (@m_alphaaa) 's Twitter Profile Photo

I'm finally releasing a project that I've been working on for a little while now. Here's Boflink, a linker for Beacon Object Files. github.com/MEhrn00/boflink Supporting blog post about it. blog.cybershenanigans.space/posts/boflink-…

Melvin langvik (@flangvik) 's Twitter Profile Photo

New video out 🥳Getting up and running with Outline, which in my opinion is the #1 on-premise, open-source Notion alternative, using Docker, Entra ID SSO and Ngrok. youtu.be/CXArj_n--04

OtterHacker (@otterhacker) 's Twitter Profile Photo

Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb ! Evilginx is really nice to setup custom phishing campaign whatever the environment is... Phishlet available here : github.com/OtterHacker/Ok…

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

Introducing a new tool of The Manticore Project: Delegations Manage Kerberos delegations like a pro: audit, add, remove, monitor & more — all in one tool! Supports unconstrained, constrained (+protocol transition), & RBCD. 🔗 github.com/TheManticorePr…

/ˈziːf-kɒn/ (@x33fcon) 's Twitter Profile Photo

Phishing defenses are evolving, but so are attackers. At #x33fcon, Kuba Gretzky will show how modern anti-phishing approaches (URL scanning, browser extensions, canaries) can be bypassed. Plus, he'll reveal novel tactics like browser-in-the-browser #phishing. Don't miss this

Phishing defenses are evolving, but so are attackers. At #x33fcon, <a href="/mrgretzky/">Kuba Gretzky</a> will show how modern anti-phishing approaches (URL scanning, browser extensions, canaries) can be bypassed. Plus, he'll reveal novel tactics like browser-in-the-browser #phishing. Don't miss this