CHILLT MAL (@chilltmal) 's Twitter Profile
CHILLT MAL

@chilltmal

Dingdong

ID: 1471942249663635459

calendar_today17-12-2021 20:36:12

19 Tweet

3 Followers

137 Following

CHILLT MAL (@chilltmal) 's Twitter Profile Photo

Stories from the Fish Pond, Part 1: Evading detection with ZIP concatenation... or, you know, maybe not. perception-point.io/blog/evasive-c…

CHILLT MAL (@chilltmal) 's Twitter Profile Photo

Stories from the Fish Pond, Part 2: Bring your own stealthy +285MB Linux environment with automatic C2 connection straight into the pond... hmm, maybe a bit too big🐳. securonix.com/blog/crontrap-…

CICADA8Research (@cicada8research) 's Twitter Profile Photo

Hello everyone! Our team loves everything related to LPE exploits. However, there is no publicly available list on the web with fresh LPE exploits (2023-2024) for Windows. However, we do have such a list. And we are sharing it with you! github.com/MzHmO/Exploit-…

CHILLT MAL (@chilltmal) 's Twitter Profile Photo

Stories from the Fish Pond, Part 3: Having trouble getting your phishing email into the inbox with the Red Team? Maybe check if your customer is a sitting duck! *Quack🦆* krebsonsecurity.com/2024/07/dont-l…

N7WEra (@n7wera) 's Twitter Profile Photo

I have put together a list of publicly known IOC for impacket. Thanks to Octoberfest7 and others on the awesome research. n7wera.notion.site/Modifing-Impac…

Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

NetExec has a new Module: Timeroast🔥 In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective! Implemented by Disgame 1/3🧵

NetExec has a new Module: Timeroast🔥

In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!

Implemented by <a href="/Disgame_/">Disgame</a>

1/3🧵
Stephan Berger (@malmoeb) 's Twitter Profile Photo

I recently learned about Cloudflare R2 buckets [1]: Threat actors can abuse Cloudflare R2 buckets for phishing by hosting malicious content or phishing landing pages in these buckets, leveraging the trusted reputation of Cloudflare to bypass security filters. R2 is not (yet)

I recently learned about Cloudflare R2 buckets [1]: Threat actors can abuse Cloudflare R2 buckets for phishing by hosting malicious content or phishing landing pages in these buckets, leveraging the trusted reputation of Cloudflare to bypass security filters.

R2 is not (yet)
sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

[BLOG 📝] The brand new NetExec #Timeroast module made me finally study the attack itself, so here are some thoughts of mine on it with a couple of use cases and a real life example. snovvcrash.rocks/2024/12/08/app…

Fabian Bader (@fabian_bader) 's Twitter Profile Photo

#TokenTactics V2 now has support for auth code flow, if you know what I mean. Other features in v0.2.5 are Invoke-RefreshToDeviceRegistrationToken and backwards compatibility for the v1 endpoint for those special cases. #Entra github.com/f-bader/TokenT…