bohops (@bohops) 's Twitter Profile
bohops

@bohops

Red/Purple/Research | Adversary Services @xforce red

ID: 896875473648701441

linkhttps://bohops.com calendar_today13-08-2017 23:25:50

7,7K Tweet

14,14K Followers

450 Following

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Decrypting credentials from SCCM site servers configured for high availability | IBM'' #infosec #pentest #redteam #blueteam ibm.com/think/x-force/…

Shane Jones (@ohmsecurities) 's Twitter Profile Photo

Well that sucked. Yours truly is looking for work - reputable red teamer, pentester with 10 years experience. OSCP/GRTE certifications, also have experience with threat intelligence. Ex-JPMC/Optiv/TrustedSec

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Venom C2 tool drop! 🐍 During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. Some had EDR so we didn't want anything off-the-shelf. The server, agent, and client were made

Venom C2 tool drop! 🐍

During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. 

Some had EDR so we didn't want anything off-the-shelf.
The server, agent, and client were made
Haidar (@haider_kabibo) 's Twitter Profile Photo

RPC Part 6 is live. I cover the toolset for external RPC research, demonstrate how to enumerate network interfaces without authentication using rpcmap, and show how to call custom RPC functions with Impacket to help develop an external fuzzer. sud0ru.ghost.io/windows-inter-…

Josh (@passthehashbrwn) 's Twitter Profile Photo

If you're into serious red teaming with a crazy skilled team we've got a US based opening! ibmglobal.avature.net/en_US/careers/…

Caitlin Condon (@catc0n) 's Twitter Profile Photo

Our initial access team has a deep dive blog out this week on creating .NET serialization gadgets by hand (or, alternatively, just using the new .NET deserialization library in VulnCheck's open-source go-exploit framework for your exploit dev needs) vulncheck.com/blog/making-do…

Stephen Fewer (@stephenfewer) 's Twitter Profile Photo

New Metasploit Project aux module in the pull queue for the FortiWeb vuln (no CVE at this time). Based on the PoC captured and posted by Defused, it leverages an auth bypass to create a new local admin account on the target. github.com/rapid7/metaspl…

New <a href="/metasploit/">Metasploit Project</a> aux module in the pull queue for the FortiWeb vuln (no CVE at this time). Based on the PoC captured and posted by <a href="/DefusedCyber/">Defused</a>, it leverages an auth bypass to create a new local admin account on the target. github.com/rapid7/metaspl…
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Attention malware analysts 💻 Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis. 📄: bit.ly/441J3vS

Attention malware analysts 💻 

Our latest blog post delves into Time Travel Debugging (TTD). We introduce the basics of WinDbg and TTD to help you start incorporating TTD into your analysis.

📄: bit.ly/441J3vS
Chris Thompson (@retbandit) 's Twitter Profile Photo

Seeing a lot of bad takes on Anthropic's incident report. A lot of people are missing the point; offensive cyber capabilities in current models are a side-effect of being trained on coding datasets. As frontier model labs and private groups start to shift to tuning current models

Seeing a lot of bad takes on Anthropic's incident report. A lot of people are missing the point; offensive cyber capabilities in current models are a side-effect of being trained on coding datasets. As frontier model labs and private groups start to shift to tuning current models
Olaf Hartong (@olafhartong) 's Twitter Profile Photo

#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. We're releasing a management tool and rule repository in YAML format to share new rules with the community. medium.com/falconforce/mi…

#MDE custom collection is finally in public preview! It's a centrally managed solution to improve visibility and detection opportunities. 

We're releasing a management tool and rule repository in YAML format to share new rules with the community.

medium.com/falconforce/mi…
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

New blog post is up exploring a vuln I found in Claude Code (CVE-2025-64755) allowing arbitrary file write without a consent prompt. New tech is always fun to explore, hopefully this post gives you some hints as to future research :) specterops.io/blog/2025/11/2…

Stuart (@magisterquis) 's Twitter Profile Photo

Slides and Such for my BSidesVienna.at talk about Linux H4x as just a bunch of syscalls, Living Under the Land on Linux Slides: docs.google.com/presentation/d… and Such: github.com/magisterquis/l…

vx-underground (@vxunderground) 's Twitter Profile Photo

I've been poking Microsoft Copilot with a stick. I've made a bunch of posts on it. This is my dumb notes and/or discussion part 1. My current machine is Windows 11 but Microsoft Copilot wasn't on the machine, so I installed it from the Microsoft app store. I don't know if the

Philip Tsukerman (@philiptsukerman) 's Twitter Profile Photo

Looks like NULLCON Berlin talks are out, so you can watch Rotem Salinas and me in my return to doing conference talks! We have some nice info about Microsoft EPM, a cool exploitation trick with the Cloud Filter driver, and a no-fix LPE for you here :) youtube.com/watch?v=0H4jcE…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Just published a summary of "modern" Windows authentication reflection attacks. Turns out reflection never really died. 😅decoder.cloud/2025/11/24/ref…

Óscar Alfonso Díaz (@oscarakaelvis) 's Twitter Profile Photo

New Evil-WinRM version (3.8). Awesome work of Luis Vacas de Santos and others involved. Thanks to all who contributed. Cool changes including Kerberos stuff and more! Ruby gem is available now "gem install evil-winrm" to update it as always.😈 github.com/Hackplayers/ev… #evilwinrm #hacking