
Chris Thompson
@_mayyhem
Adversary Simulation @SpecterOps
github.com/Mayyhem
ID: 3437913971
24-08-2015 13:00:55
418 Tweet
2,2K Followers
460 Following


Found a .NET method on SCCM site servers that can be called to decrypt secrets stored in the site DB a while back with Garrett and Lee Chagolla-Christensen. Another alternative to 🥝🏳️🌈 Benjamin Delpy's mimikatz misc::sccm, Adam Chester 🏴☠️'s C# gist, and Sanjiv Kawa's SQLRecon. github.com/subat0mik/Misc…





New blog post just dropped! 🙌 Read the latest from Matt Creel on how an operator can perform situational awareness steps prior to making an Entra ID token request and how tokens can be effectively used once obtained. ghst.ly/4lA5Iqu

Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out this deep dive from Elad Shamir on NTLM relay attacks & the new edges we recently added to BloodHound. ghst.ly/4lv3E31


I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most interesting vulnerabilities that combine commonality and impact from low-privilege contexts, and what you can do to prevent them :) logan-goins.com/2025-04-25-scc…


Your #MDT shares might be spilling secrets like a drunk uncle at a wedding. 🍷💬 In my latest post for TrustedSec, I dig into how Red Teamers can extract creds from MDT shares — and why your MDT deployment server might need a security makeover. Read all about it here:


I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escalate privileges and take over the forest. Check out Jim Sykora's latest blog post to understand how you can mitigate risk. ghst.ly/4kXTLd9