Shawn (@anthemtotheego) 's Twitter Profile
Shawn

@anthemtotheego

Adversary Simulation @ X-Force Red | Head of Capability R&D | Implant Dev | Work In Progress | Thoughts My Own | github.com/anthemtotheego

ID: 191135487

linkhttps://blog.redxorblue.com calendar_today15-09-2010 17:56:55

870 Tweet

2,2K Followers

369 Following

Josh (@passthehashbrwn) 's Twitter Profile Photo

Also want to highlight that this AMSI bypass uses the same behavior that, according to Microsoft, enabled SQL Server 2005 to load assemblies from the database learn.microsoft.com/en-us/archive/…

Chris Thompson (@retbandit) 's Twitter Profile Photo

Get ready to learn advanced red teaming of ML Ops platforms and hacking AI data science tools with Brett Hawkins and me this Black Hat! We'll have in-depth labs for both cloud-based AI-as-a-Service and on-prem platforms.

Get ready to learn advanced red teaming of ML Ops platforms and hacking AI data science tools with <a href="/h4wkst3r/">Brett Hawkins</a> and me this Black Hat! We'll have in-depth labs for both cloud-based AI-as-a-Service and on-prem platforms.
Brett Hawkins (@h4wkst3r) 's Twitter Profile Photo

Come and join us to learn how to attack and defend popular platforms that are used to develop and deploy ML models! ⬇️

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Loki C2 is coming.. Cross-platform Stage 1 C2, battle-tested in ops for 8 months against the world’s leading EDRs and MSSPs, undetectable, bypasses Application Control/WDAC.. Shoutouts to Dylan Tran for helping build the project, and chompie & Ellis Springe for inspiration!

Loki C2 is coming..
Cross-platform Stage 1 C2, battle-tested in ops for 8 months against the world’s leading EDRs and MSSPs, undetectable, bypasses Application Control/WDAC..
Shoutouts to <a href="/d_tranman/">Dylan Tran</a> for helping build the project, and <a href="/chompie1337/">chompie</a> &amp; <a href="/knavesec/">Ellis Springe</a> for inspiration!
Josh M (@joshtmerrill) 's Twitter Profile Photo

magic-box.dev/hacking/smolta… securityintelligence.com/x-force/smolta… wooo new blog on an rce i found in in Hugging Face's smolagents library 🥳. check it out if you ❤️ ai x security :)

sinusoid (@the_bit_diddler) 's Twitter Profile Photo

Tradecraft is great and all, but data is still king. Time is inelastic. How about parsing and reconciling ADIDNS records with known systems, quickly, for LARGE environments (400K+ in under 1/10th of a second) AND fast BloodHound ingestion guidance? github.com/EspressoCake/A…

freefirex (@freefirex2) 's Twitter Profile Photo

Would you like to transition from local user to cloud access w/o having to dump browser cookies or hope SSO via kerberos is enabled? 🧵

Would you like to transition from local user to cloud access w/o having to dump browser cookies or hope SSO via kerberos is enabled? 🧵
Chris Thompson (@retbandit) 's Twitter Profile Photo

It was an honor to speak at the 780th Military Intelligence Brigade (Cyber)’s AvengerCon on the use of AI in Offensive Cyber Operations, Vuln Discovery/Weaponization, OST Dev as well as attacking AI systems. Stay tuned for an announcement of the 1st dedicated Offensive AI Conference in 2 weeks, coming to San

It was an honor to speak at the <a href="/780thC/">780th Military Intelligence Brigade (Cyber)</a>’s AvengerCon on the use of AI in Offensive Cyber Operations, Vuln Discovery/Weaponization, OST Dev as well as attacking AI systems. 
Stay tuned for an announcement of the 1st dedicated Offensive AI Conference in 2 weeks, coming to San
Bobby Cooke (@0xboku) 's Twitter Profile Photo

Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to Dylan Tran and chompie for all their contributions to Loki C2! IBM IBM Security X-Force securityintelligence.com/x-force/bypass…

chompie (@chompie1337) 's Twitter Profile Photo

Amazing blog post by Bobby! Highly recommend if you’re interested in red teaming ttps against hardened environments. Stay tuned for a follow up post from me on abusing trusted electron apps to bypass the strictest WDAC policies and execute shellcode natively 👀

Chris Thompson (@retbandit) 's Twitter Profile Photo

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com. Co-organized by RemoteThreat, Dreadnode, & DEVSEC. The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com.

Co-organized by RemoteThreat, Dreadnode, &amp; DEVSEC.

The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,
Chris Thompson (@retbandit) 's Twitter Profile Photo

The CFP for Offensive AI Con is now open! We’d love to hear about how you’re using knowledge assistants, semi/fully autonomous workflows, agents, or specialized models to find and weaponize vulnerabilities, speed up offensive cyber operations, develop capabilities faster, solve

Dylan Tran (@d_tranman) 's Twitter Profile Photo

Had a lot of fun digging into COM stuff with bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…

Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me about a bug in Power Apps that allows execution of arbitrary SQL queries on hosts connected through on-prem data gateways. This can turn external O365 access into compromised on-prem SQL servers. ibm.com/think/x-force/…

chompie (@chompie1337) 's Twitter Profile Photo

Gave the most personal and vulnerable keynote I will (probably) ever give at BSides Nashville this weekend. Thank you to everyone who told me they can relate, it means more to me than you know! Also shoutout to those who donated to Hak4Kidz 🫶🏼, a new record

Gave the most personal and vulnerable  keynote I will (probably) ever give at <a href="/bsidesnash/">BSides Nashville</a> this weekend. Thank you to everyone who told me they can relate, it means more to me than you know! Also shoutout to those who donated to Hak4Kidz 🫶🏼, a new record
chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…

Shawn (@anthemtotheego) 's Twitter Profile Photo

Pro security tip that you don’t want to miss. If you unplug your computer from the network and turn it off, your security can’t be bypassed.