Aku (@akumarachi) 's Twitter Profile
Aku

@akumarachi

ID: 1004372099341914113

calendar_today06-06-2018 14:39:03

109 Tweet

174 Takipçi

38 Takip Edilen

BlackWasp (@blwasp_) 's Twitter Profile Photo

Just updated my ADCS cheatsheet with the new ESC9 & 10 attacks, and a refactor of the page : hideandsec.sh/books/cheatshe… Additionally, I have added these ESC to The Hacker Recipes of Charlie Bromberg « Shutdown » with more explains on this page : thehacker.recipes/ad/movement/ad…

Dramelac (@dramelac_) 's Twitter Profile Photo

Tired of having to record your actions by hand during your pentest? Don't panic, Exegol 4.0.5 is here with an automatic recording of your sessions (input and output) Also a new system of filesystem rights shared between your host user and your container. github.com/ShutdownRepo/E…

Tired of having to record your actions by hand during your pentest? Don't panic, Exegol 4.0.5 is here with an automatic recording of your sessions (input and output)
Also a new system of filesystem rights shared between your host user and your container.
github.com/ShutdownRepo/E…
Aku (@akumarachi) 's Twitter Profile Photo

Recently, I generated loose compare tables for every version of every language. 🥳 In this repo you will find a list of all the results of comparisons between different data types, in #PHP, #MySQL, #Postgres, etc. github.com/Hakumarachi/Lo…

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

Last year, I tweeted about #Administrator accounts not following the #lockout policy. Yesterday, Microsoft issued an advisory (#KB5020282) solving this problem by adding an #account lockout to local administrators accounts: ⤵️ support.microsoft.com/en-us/topic/kb… x.com/podalirius_/st…

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

[#thread 🧵] I am very proud to announce that I will be giving a talk at Black Hat Europe 2022 (#BHEU) in London 7-8 December 🥳🎉 In this #talk, I'll demonstrate how to automate the search of Remote Procedure Calls (#RPC) to #coerce authentications on Windows machines.

[#thread 🧵] I am very proud to announce that I will be giving a talk at <a href="/BlackHatEvents/">Black Hat</a> Europe 2022 (#BHEU) in London 7-8 December 🥳🎉

In this #talk, I'll demonstrate how to automate the search of Remote Procedure Calls (#RPC) to #coerce authentications on <a href="/Windows/">Windows</a> machines.
Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

[#thread 🧵] No, #ChatGPT does not execute commands. I've seen a few posts about how ChatGPT is capable of executing linux commands. Here is what actually happens step by step: ⤵️

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

I've just published a little #osint tool to extract all the users from a #GiTea server, with or without authentication. This is really useful to create wordlists of possible usernames in redteams for example ;) github.com/p0dalirius/git…

Aku (@akumarachi) 's Twitter Profile Photo

I've just published a little #pwn Blind ROP tool along with 3 custom vulnerable examples to try it. Check it out and let me know what you think. #infosec #hacking #ctf github.com/Hakumarachi/Br…

Aku (@akumarachi) 's Twitter Profile Photo

Hey #CTF enthusiasts! Today I'm releasing the first version of CTF recipes! This wiki mainly focuses on #pwn techniques for now, but stay tuned for future topics! #OpenSource #CyberSecurity ctfrecipes.com

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Completed implementing built-in pass-the-hash in #BRc4 after spending a lot of time with Mimikatz and a great blog written by S3cur3Th1sSh1t . More interesting things are on the way. The below blog is a must read to understand the technique at code level. s3cur3th1ssh1t.github.io/Named-Pipe-PTH/

Completed implementing built-in pass-the-hash in #BRc4 after spending a lot of time with Mimikatz and a great blog written by <a href="/ShitSecure/">S3cur3Th1sSh1t</a> . More interesting things are on the way. The below blog is a must read to understand the technique at code level.
s3cur3th1ssh1t.github.io/Named-Pipe-PTH/
Aku (@akumarachi) 's Twitter Profile Photo

Interested by cryptographic stuff? I've just updated ctfrecipes.com, featuring cryptographic techniques such as AES padding oracle. Keep learning and take your skills to the next level! #CTF #Cybersecurity #AES #Crypto

Charlie Bromberg « Shutdown » (@_nwodtuhs) 's Twitter Profile Photo

Let’s goo, European Cyber Cup is over 🏴‍☠️ 🥇 We won the bug bounty (Lucien Doustaly « Wlayzz » did it all) 🥉 We ended 3rd on Forensic 🥉 And we finished 3rd on general scoreboard (1st enterprise team) We had a blast, great orgs, great challs, great teams, big improvement since 2022 ✌️

Let’s goo, <a href="/EuCyberCup/">European Cyber Cup</a> is over 🏴‍☠️ 
🥇 We won the bug bounty (<a href="/Wlayzz/">Lucien Doustaly « Wlayzz »</a> did it all)
🥉 We ended 3rd on Forensic
🥉 And we finished 3rd on general scoreboard (1st enterprise team)

We had a blast, great orgs, great challs, great teams, big improvement since 2022 ✌️
Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

(1/3) I've released publicly a new tool/library called #objectwalker that I have been working on for a few months. 🥳 ObjectWalker allows you to find paths into python objects to find interesting targets, in breadth first search or depth first search! ➡️github.com/p0dalirius/obj…

(1/3) I've released publicly a new tool/library called #objectwalker that I have been working on for a few months. 🥳

ObjectWalker allows you to find paths into python objects to find interesting targets, in breadth first search or depth first search!

➡️github.com/p0dalirius/obj…
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

The DOJO challenge #23 is over! We have our 3 winners! 🏆 Congrats to Perce, i_know_naught , Aku The swag are on their way! Keep an eye on your mailbox 📬 You can find the solution and a write-up for the DOJO challenge on our blog 👇 blog.yeswehack.com/dojo/dojo-chal… #YesWeRHackers

The DOJO challenge #23 is over!

We have our 3 winners! 🏆
Congrats to <a href="/PerceSecu/">Perce</a>, <a href="/Iknownaught/">i_know_naught</a> , Aku

The swag are on their way!
Keep an eye on your mailbox 📬

You can find the solution and a write-up for the DOJO challenge on our blog 👇
blog.yeswehack.com/dojo/dojo-chal…

#YesWeRHackers
Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

I've just released GeoWordlists, a tool to generate wordlists of passwords containing cities at a defined distance around the client city. This is pretty useful for spraying / bruteforcing in internal pentests on an Active directory domain for example! ➡️github.com/p0dalirius/Geo…

I've just released GeoWordlists, a tool to generate wordlists of passwords containing cities at a defined distance around the client city.

This is pretty useful for spraying / bruteforcing in internal pentests on an Active directory domain for example!

➡️github.com/p0dalirius/Geo…
Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

I am delighted to announce that Microsoft has awarded me the title of Microsoft MVP for my contributions in the security field.🥳 I want to thank all those with whom I have worked over the years, and in particular Mud, mpgn, Noobosaurus R3x 🦖, Hackt Back and Aku

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

Release 2.2.1 of objectwalker is out! 🥳🎉 Fixes a few bugs and optimized the search! Very useful for solving Python jails or finding Server Side Template Injection payloads in python github.com/p0dalirius/obj…

Aku (@akumarachi) 's Twitter Profile Photo

I've just released ccacheExtractor, a tool to dump all kerberos tickets from KCM store. This is pretty useful to obtain AD account ! 🚀 #CyberSecurity 👉 Check it out: github.com/Hakumarachi/cc…