CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿

@_ethicalchaos_

Ceri Coburn: Hacker | R̷u̷n̷n̷e̷r̷ DIYer| Vizsla Fanboy and a Little Welsh Bull apparently 🏴󠁧󠁢󠁷󠁬󠁳󠁿
Author of poorly coded tools: github.com/CCob

ID: 3040823313

linkhttps://ethicalchaos.dev/ calendar_today16-02-2015 15:08:04

3,3K Tweet

9,9K Followers

436 Following

sapir federovsky (@sapirxfed) 's Twitter Profile Photo

This is a very cool vuln! and the writing is so good! i prepared a small diagram for (very) basic explanation of the method. It's not a replacement for the post, but it can help understand the basics😀netspi.com/blog/technical…

This is a very cool vuln! and the writing is so good! i prepared a small diagram for (very) basic explanation of the method. It's not a replacement for the post, but it can help understand the basics😀netspi.com/blog/technical…
Ruben Labs (@rubenlabs) 's Twitter Profile Photo

Happy to share my newly discovered vulnerabilities on Microsoft Windows! - Credentials based UAC bypass, allowing to bypass the highest level - Task Metadata Poisoning - Task Event Log Buffer Overflow - Unprivileged Security Logs Saturation cymulate.com/blog/task-sche…

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I'll be returning to #BHUSA Black Hat this summer for a brand talk about moving laterally from AD to Entra ID. I don't think I've ever been this excited about a talk, with lots of cool stuff to share 🎢 😄.

I'll be returning to #BHUSA <a href="/BlackHatEvents/">Black Hat</a> this summer for a brand talk about moving laterally from AD to Entra ID. I don't think I've ever been this excited about a talk, with lots of cool stuff to share 🎢 😄.
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

Our first production BOF-PE in action using RPC that will throw RPC exceptions on errors and catch gracefully ✅ wil library use for RAII, no handle leaks ✅ API calls wrapped around wil and throws on errors ✅ stl used for formatting and threading ✅ All for ~130 lines of code

Our first production BOF-PE in action using RPC that will throw RPC exceptions on errors and catch gracefully
✅ wil library use for RAII, no handle leaks 
✅ API calls wrapped around wil and throws on errors
✅ stl used for formatting and threading
✅ All for ~130 lines of code
Logan Goins (@_logangoins) 's Twitter Profile Photo

I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

SpecterOps (@specterops) 's Twitter Profile Photo

BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out Jim Sykora's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9

Rio (@0x09al) 's Twitter Profile Photo

We have already received some incredible submissions for the 4th edition of BSides Tirana . From hacking Machine Learning models to deep dives into Vehicle Security. The lineup is shaping up to be our best yet! Think you’ve got a talk that belongs on that stage? We’d love to

We have already received some incredible submissions for the 4th edition of <a href="/BSidesTirana/">BSides Tirana</a> . From hacking Machine Learning models to deep dives into Vehicle Security. The lineup is shaping up to be our best yet!

Think  you’ve got a talk that belongs on that stage?
We’d love to
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

New blog post is up! Stepping out of my comfort zone (be kind), looking at Meta's Prompt Guard 2 model, how to misclassify prompts using the Unigram tokenizer and hopefully demonstrate why we should invest time looking beyond the API at how LLMs function. specterops.io/blog/2025/06/0…

Rio (@0x09al) 's Twitter Profile Photo

Oh you thought surprises were over for BSides Tirana 2025 ? This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn" (SinSinology) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000. He’s been kind enough to

Oh you thought surprises were over for <a href="/BSidesTirana/">BSides Tirana</a> 2025 ?

This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn"
(<a href="/SinSinology/">SinSinology</a>) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000.

He’s been kind enough to