Nacho Gomez (@_nag0mez) 's Twitter Profile
Nacho Gomez

@_nag0mez

Offensive Security @ NCC Group | ❤️ Breaking Things

ID: 1141099167772807168

linkhttps://pwnedcoffee.com/ calendar_today18-06-2019 21:43:36

200 Tweet

374 Followers

378 Following

5pider (@c5pider) 's Twitter Profile Photo

In Havoc 0.7 [Bite the Dust] is going to be able to use gadgets while performing sleep obfuscation to indirectly call functions without triggering detections like patriot (by Joe Desimone )

In Havoc 0.7 [Bite the Dust] is going to be able to use gadgets while performing sleep obfuscation to indirectly call functions without triggering detections like patriot (by <a href="/dez_/">Joe Desimone</a> )
b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

I published the slides for my talk at #SANS #Hackfest. I sort of hijacked my own talk to give my perspective on Offensive Security capability engineering, framing it with a practical example. github.com/FuzzySecurity/… I want to shout out mr.d0x and Adam Chester 🏴‍☠️ of course <3

I published the slides for my talk at #SANS #Hackfest. I sort of hijacked my own talk to give my perspective on Offensive Security capability engineering, framing it with a practical example.

github.com/FuzzySecurity/…

I want to shout out <a href="/mrd0x/">mr.d0x</a> and <a href="/_xpn_/">Adam Chester 🏴‍☠️</a> of course &lt;3
CCN-CERT (@ccncert) 's Twitter Profile Photo

Asistimos en la sala 20 al taller Malware Development 201 - Creando un Loader en C++ centrado en Evasión (Windows), en la sala 20, patrocinada por #CSA, a cargo de Nacho Gomez y Antonio Pérez, de NTT DATA España #XVIIJornadasCCNCERT #VJornadasESPDEFCERT

Asistimos en la sala 20 al taller Malware Development 201 - Creando un Loader en C++ centrado en Evasión (Windows), en la sala 20, patrocinada por #CSA, a cargo de <a href="/_nag0mez/">Nacho Gomez</a> y Antonio Pérez, de <a href="/NTTDataSpain/">NTT DATA España</a> #XVIIJornadasCCNCERT #VJornadasESPDEFCERT
Nacho Gomez (@_nag0mez) 's Twitter Profile Photo

Ya están subidas las diapositivas y las POCs del taller "Malware Development 201" presentado ayer en las XVII Jornadas STIC de CCN-CERT. Espero que os gustara! github.com/ASOT-LABS/XVII…

Swissky (@pentest_swissky) 's Twitter Profile Photo

AD Miner is an Active Directory audit tool that leverages cypher queries to crunch data from the #Bloodhound graph database to uncover security weaknesses github.com/Mazars-Tech/AD…

Rasta Mouse (@_rastamouse) 's Twitter Profile Photo

Found a funny way to detect Rubeus. There's a typo in the process name used when calling LsaRegisterLogonProcess, which shows up in the Windows audit logs. Not sure if that was intentional given the code comment right next to it.

Found a funny way to detect Rubeus. There's a typo in the process name used when calling LsaRegisterLogonProcess, which shows up in the Windows audit logs. Not sure if that was intentional given the code comment right next to it.
Pavel Yosifovich (@zodiacon) 's Twitter Profile Photo

Want to learn malware analysis and development? Join me and @MalFuzzer for a training course like no other! training.trainsec.net/malware-analys…

Nacho Gomez (@_nag0mez) 's Twitter Profile Photo

It’s been an awesome week offensivecon! Yarden Shafir’s Windows Internals Training was 🔥🔥 Sadly I could not stay for the talks, but already thinking in the next one! Awesome training if you want to dive deep into the Windows kernel from an offsec perspective

Inés (@ineesdv) 's Twitter Profile Photo

Tangled is a social engineering platform that weaponizes calendar event processing in Outlook and Gmail to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction. github.com/ineesdv/Tangled Technical breakdown: tarlogic.com/blog/abusing-c…