Rezk0n (@rezk0n) 's Twitter Profile
Rezk0n

@rezk0n

Bug trafficking, *OSX and Android research. (I want to do all the things but time..)

ID: 2528982907

linkhttps://x64.sh calendar_today28-05-2014 03:38:34

416 Tweet

227 Takipçi

1,1K Takip Edilen

attackify (@attackify) 's Twitter Profile Photo

New Module: Software Inventory CVE Scan Its not always about the awesome Threat Simulations! Use this new security control module for Linux & MacOS endpoints to list & scan the installed software inventory of endpoints to matching CVEs via the NVD CVE database. Sign up for

New Module: Software Inventory CVE Scan

Its not always about the awesome Threat Simulations! 
Use this new security control module for Linux & MacOS endpoints to list & scan the installed software inventory of endpoints to matching CVEs via the NVD CVE database.

Sign up for
attackify (@attackify) 's Twitter Profile Photo

New Module: Credential Guard Bypass - WDigest It is possible to bypass Microsoft's Credential Guard by patching WDigest in-memory to enable clear-text credential storage on secured endpoints. This module will attempt to emulate malicious APT behavior attempting to patch WDigest

New Module: Credential Guard Bypass - WDigest

It is possible to bypass Microsoft's Credential Guard by patching WDigest in-memory to enable clear-text credential storage on secured endpoints.

This module will attempt to emulate malicious APT behavior attempting to patch WDigest
Swissky (@pentest_swissky) 's Twitter Profile Photo

ServiceNow Insecure Access Control To Full Admin Takeover - https://x64[.]sh/posts/ServiceNow-Insecure-access-control-to-admin/

attackify (@attackify) 's Twitter Profile Photo

Seeing a bunch of 100% scores on EDRs in some reports lately 🤔 At ATTACKIFY, we don't promise 100% scores... but we do promise to test 100% of the EDRs out there! Let's see how they really hold up! 😉🔍 Sign up today and start putting your EDRs up to its paces!

Seeing a bunch of 100% scores on EDRs in some reports lately 🤔 

At ATTACKIFY, we don't promise 100% scores... but we do promise to test 100% of the EDRs out there! 

Let's see how they really hold up! 😉🔍 

Sign up today and start putting your EDRs up to its paces!
attackify (@attackify) 's Twitter Profile Photo

🔐 New Module: LOLDrivers Scan! While ATTACKIFY excels in automated adversary simulations, we're also about enhancing endpoint security. Our newest module leverages the awesome work from the #LOLDrivers project, allowing seamless malicious and vulnerable drivers scans on your

🔐 New Module: LOLDrivers Scan!

While ATTACKIFY excels in automated adversary simulations, we're also about enhancing endpoint security. 

Our newest module leverages the awesome work from the #LOLDrivers project, allowing seamless malicious and vulnerable drivers scans on your
attackify (@attackify) 's Twitter Profile Photo

🔐 Introducing the Bootloader.io Scanner Module for ATTACKIFY! Following the success of our LOLDrivers Scanner Module, we're excited to unveil the Bootloader.io Scanner. Dive deep into detecting malicious bootloaders using data from the awesome project hosted

🔐 Introducing the Bootloader.io Scanner Module for ATTACKIFY!

Following the success of our LOLDrivers Scanner Module, we're excited to unveil the Bootloader.io Scanner. Dive deep into detecting malicious bootloaders using data from the awesome project hosted
attackify (@attackify) 's Twitter Profile Photo

🚀 New Feature in ATTACKIFY! Introducing attack scheduling - our latest feature to further automate & schedule attack simulations on a continuous daily, weekly, or monthly basis on single or multiple endpoints & environments is out now. That and some more details in our latest

attackify (@attackify) 's Twitter Profile Photo

🚀 Exciting New Module in #ATTACKIFY  - OceanLotus 🚀 A new module inspired by the awesome research from Cat & Megan Carney and the @MITREengenuity team on OceanLotus APT emulation! 🛡️ Dive deep into advanced threat simulations & hone your defenses by experiencing

Theori (@theori_io) 's Twitter Profile Photo

Do you use a virtual machine to browse dangerous links safely? If you use the Chrome browser inside that virtual machine, is it secure enough? As you might have guessed, the answer is not so much. We chained six unique CVEs from 2023 listed below. • Chrome Renderer RCE :

Andy Nguyen (@theflow0) 's Twitter Profile Photo

Decided to publish PPPwn early. The first PlayStation 4 Kernel RCE. Supporting FWs upto 11.00. github.com/TheOfficialFlo…

attackify (@attackify) 's Twitter Profile Photo

🚨 Attention Australian Businesses and Educational Institutes! 🚨 We're offering FREE Professional ATTACKIFY accounts for the rest of 2024 if you register for a FREE account in June. We want to help protect against the current surge in cyber attacks seen in Australia lately.

attackify (@attackify) 's Twitter Profile Photo

🚀 New Module Alert! 🚀 We're excited to introduce our latest ATTACKIFY module targeting CVE-2024-26229, a vulnerability in the Windows CSC Service. 🔍 Key Features: - Test & Validate Security Controls: Focus on local privilege escalation detection & prevention. - Real-World

🚀 New Module Alert! 🚀

We're excited to introduce our latest ATTACKIFY module targeting CVE-2024-26229, a vulnerability in the Windows CSC Service.

🔍 Key Features:
- Test & Validate Security Controls: Focus on local privilege escalation detection & prevention.

- Real-World
attackify (@attackify) 's Twitter Profile Photo

🚀 Bridging MITRE ATT&CK with ATTACKIFY for Advanced Threat Actor Emulation! Exciting news! We've just released a new CLI tool in beta to compliment ATTACKIFY that will help you instantly run emulations based on any ATT&CK Threat Actor Group Profiles. 🎯 Map ATT&CK TTPs

chompie (@chompie1337) 's Twitter Profile Photo

This is what I mean when I say working with MSRC is degrading. They want everything: write up, stack traces, PoC, exploit source, analysis, life advice, approval on anything you will ever publish. In return they will patch your bug whenever they feel like it and not tell you