Andrew Oliveau (@andrewoliveau) 's Twitter Profile
Andrew Oliveau

@andrewoliveau

Adversary Simulation @XForce ♦️

ID: 622022345

calendar_today29-06-2012 16:06:49

676 Tweet

3,3K Takipçi

736 Takip Edilen

Aurélien Chalot (@defte_) 's Twitter Profile Photo

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D Blogpost: sensepost.com/blog/2025/is-t… Tool: github.com/fortra/impacke… And also, big thanks to jmk (Joe Mondloch) for the collab' :D!

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D

Blogpost: sensepost.com/blog/2025/is-t…
Tool: github.com/fortra/impacke…

And also, big thanks to jmk (Joe Mondloch) for the collab' :D!
Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me about a bug in Power Apps that allows execution of arbitrary SQL queries on hosts connected through on-prem data gateways. This can turn external O365 access into compromised on-prem SQL servers. ibm.com/think/x-force/…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

BOF execution now working in Loki! I'll release it public next week. Shoutout to TrustedSec, COFFLoader is well written, which made it easy to port to a node module! COFFLoader Project: github.com/trustedsec/COF… Loki C2 Project: github.com/boku7/Loki

BOF execution now working in Loki!

I'll release it public next week.
Shoutout to <a href="/TrustedSec/">TrustedSec</a>, COFFLoader is well written, which made it easy to port to a node module!

COFFLoader Project: github.com/trustedsec/COF…
Loki C2 Project: github.com/boku7/Loki
Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

I am Jakoby nafiez I mean there’s a bunch of other zero click hash leaks out there as well - some I blogged about nearly 5 years ago are still active 😂 mdsec.co.uk/2021/02/farmin… I just think “This is truly one of the best exploits I’ve ever witnessed” is a wild statement to make 😂

Bobby Cooke (@0xboku) 's Twitter Profile Photo

BOF execution ⚡ is now live in Loki C2! Execute COFF files in backdoored Electron app memory using the ported COFFLoader project from TrustedSec! 🏴‍☠️ COFFLoader Project: github.com/trustedsec/COF…… Loki C2 Project: github.com/boku7/Loki

BOF execution ⚡  is now live in Loki C2!

Execute COFF files in backdoored Electron app memory using the ported COFFLoader project from <a href="/TrustedSec/">TrustedSec</a>! 🏴‍☠️

COFFLoader Project: github.com/trustedsec/COF……

Loki C2 Project: github.com/boku7/Loki
Bobby Cooke (@0xboku) 's Twitter Profile Photo

⚡️ Loki C2 just leveled up! 🍄🧙‍♂️ 🔗 Agents can now link to each other, and across platforms! 🔗 No internet? No problem. Chain them, pivot deep, and keep moving! X-Force IBM IBM Security Check out the new release here: github.com/boku7/Loki

⚡️ Loki C2 just leveled up! 🍄🧙‍♂️
🔗 Agents can now link to each other, and across platforms! 🔗
No internet? No problem.
Chain them, pivot deep, and keep moving!
<a href="/XForce/">X-Force</a> <a href="/IBM/">IBM</a> <a href="/IBMSecurity/">IBM Security</a> 
Check out the new release here: github.com/boku7/Loki
bohops (@bohops) 's Twitter Profile Photo

A quick update to "The Ultimate WDAC Bypass List" - Added Bobby Cooke's excellent writeup and tradecraft for "Bypassing Windows Defender Application Control with Loki C2" (via Electron Apps) [ibm.com/think/x-force/…] github.com/bohops/Ultimat…

Justin Elze (@hackinglz) 's Twitter Profile Photo

If you want to be a successful red teamer in 2025, do you have to be able to code(This includes with or without the assistance of LLM)?

Shawn (@anthemtotheego) 's Twitter Profile Photo

Pro security tip that you don’t want to miss. If you unplug your computer from the network and turn it off, your security can’t be bypassed.

Grok (@grok) 's Twitter Profile Photo

Bobby Cooke HotCakeX ✡︎ סגול Bobby Cooke Hey Bobby, I’ll break this down for HotCakeX ✡︎ סגול in a way that cuts through the noise. App Control, or WDAC as we used to call it, is basically a gatekeeper that decides which apps can run on a system. It’s like a bouncer at a club—only the “trusted” apps on the VIP list