Ring3API ๐Ÿ‡บ๐Ÿ‡ฆ (@ntlmrelay) 's Twitter Profile
Ring3API ๐Ÿ‡บ๐Ÿ‡ฆ

@ntlmrelay

#ThreatHunting / #BlueTeam engineer. I'm just looking for traces in the logs. Reading and retweeting cool stuff.
MITRE ATT&CK Defender:CTI,SOCAsses,AE,PTM,THDE.

ID: 394156689

linkhttps://twitter.com/ calendar_today19-10-2011 17:12:20

14,14K Tweet

6,6K Followers

2,2K Following

VMRay (@vmray) 's Twitter Profile Photo

๐Ÿ”ฅ We uncovered notable shifts in how threat actors stage payload delivery, including emerging combinations of preferred loader, dropper and payload pairings. We think these insights reveal interesting patterns that were previously not shared, and provide a view of the

๐Ÿ”ฅ We uncovered notable shifts in how threat actors stage payload delivery, including emerging combinations of preferred loader, dropper and payload pairings. 

We think these insights reveal interesting patterns that were previously not shared, and provide a view of the
Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

Many commented that determining when a breach began depends on how long the victim retains its logs. Thatโ€™s simply not true. Log data is just one piece of forensic evidence, and often not even the most reliable. Analysts can build timelines from dozens of other artifacts โ€“ file

AlexandruC4 (@alexandruc4) 's Twitter Profile Photo

Europol and Latvian law enforcement dismantled five servers, seized 1,200 SIM box devices and 40,000 active SIM cards. The criminals were linked to over 1,700 cyber fraud cases in Austria and 1,500 in Latvia, causing losses of several million euros, including EUR 4.5 million in

Logan Goins (@_logangoins) 's Twitter Profile Photo

I feel like Yuval Gordon's briefly mentioned new dMSA account takeover mechanism in his last blog didn't get enough attention. A new account takeover mechanism is on the horizon. I wrote a blog detailing it, releasing with a new BOF I wrote called BadTakeover specterops.io/blog/2025/10/2โ€ฆ

Elastic (@elastic) 's Twitter Profile Photo

Stop wrestling with ES|QL syntax. The new Python query builder in the Elasticsearch client does the heavy lifting for you. ๐Ÿ‘‰ Try it out on #ElasticSearchLabs: go.es.io/3WP6KU8

SpecterOps (@specterops) 's Twitter Profile Photo

Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carรธe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more โคต๏ธ ghst.ly/4qtl2rm

Florian Roth โšก๏ธ (@cyb3rops) 's Twitter Profile Photo

The blog links a free NetNTLMv1 cracking site (ntlmv1.com) whose operator appears tied to Chengdu Mistiny Ltd., a company in Sichuan, China. I don't know if you really want to let them crack your hash values.

The blog links a free NetNTLMv1 cracking site (ntlmv1.com) whose operator appears tied to Chengdu Mistiny Ltd., a company in Sichuan, China. I don't know if you really want to let them crack your hash values.
๐Ÿ•ณ (@sekurlsa_pw) 's Twitter Profile Photo

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. research.google/resources/dataโ€ฆ Dataset is available for download at: โ–ช๏ธconsole.cloud.google.com/storage/browseโ€ฆ [Login required] โ–ช๏ธgs://net-ntlmv1-tables

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. 
research.google/resources/dataโ€ฆ
Dataset is available for download at:
โ–ช๏ธconsole.cloud.google.com/storage/browseโ€ฆ [Login required]
โ–ช๏ธgs://net-ntlmv1-tables
Panos Gkatziroulis ๐Ÿฆ„ (@netbiosx) 's Twitter Profile Photo

EDR-Redir uses a Bind Filter (mini filter bindflt.sys) and the Windows Cloud Filter API (cldflt.sys) to redirect the Endpoint Detection and Response (EDR) 's working folder to a folder of the attacker's choice github.com/TwoSevenOneT/Eโ€ฆ

Panos Gkatziroulis ๐Ÿฆ„ (@netbiosx) 's Twitter Profile Photo

๐Ÿ› ๏ธ SockTail - Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. โœ… Designed for red team operations and ephemeral access into restricted environments using Tailscaleโ€™s embedded client (tsnet). github.com/Yeeb1/SockTail

TrustedSec (@trustedsec) 's Twitter Profile Photo

Forget common backdoors โ€” a DLL hijack in Windows Narrator can grant SYSTEM-level persistence at login. In our new blog, Oddvar Moe shows how attackers abuse accessibility features and what defenders should monitor. Read now! trustedsec.com/blog/hack-cessโ€ฆ

๐Ÿ•ณ (@sekurlsa_pw) 's Twitter Profile Photo

PowerShell script to copy locked files. Has two modes: MFT (master file table) and Metadata (fsutil). Last one didnโ€™t work on my payload VM but MFT mode did work.

PowerShell script to copy locked files. 

Has two modes: MFT (master file table)  and Metadata (fsutil). Last one didnโ€™t work on my payload VM but MFT mode did work.
SpecterOps (@specterops) 's Twitter Profile Photo

AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. ๐Ÿ˜ฌ Jim Sykora went to the source code to debunk decades of misconceptions โ€” including ones in Microsoft's own docs. Read more โคต๏ธ ghst.ly/3Lpmjzv

Melvin langvik (@flangvik) 's Twitter Profile Photo

I felt another MythicC2 demo and showcase was in order, showing off both the new Forge collection utility, but also my Apollo fork with HTTPx Malleable Profile support. Video is out now (link in comments)

I felt another MythicC2 demo and showcase was in order, showing off both the new Forge collection utility, but also my Apollo fork with HTTPx Malleable Profile support. Video is out now (link in comments)
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Bitdefender, with support from Georgian CERT, exposes Curly COMradesโ€™ new tactic of deploying a tiny Alpine Linux VM via Hyper-V to run CurlyShell and CurlCat, securing persistence while bypassing standard EDR solutions. businessinsights.bitdefender.com/curly-comradesโ€ฆ

Bitdefender, with support from Georgian CERT, exposes Curly COMradesโ€™ new tactic of deploying a tiny Alpine Linux VM via Hyper-V to run CurlyShell and CurlCat, securing persistence while bypassing standard EDR solutions. businessinsights.bitdefender.com/curly-comradesโ€ฆ
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Dynamic EDR Evasion. A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER). A great post by Matt Hand (Matt Hand). Source: medium.com/@matterpreter/โ€ฆ #redteam #blueteam #maldev #evasion

Dynamic EDR Evasion.

A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER).

A great post by Matt Hand (<a href="/matterpreter/">Matt Hand</a>).

Source: medium.com/@matterpreter/โ€ฆ

#redteam #blueteam #maldev #evasion
Horizon Secured (@horizon_secured) 's Twitter Profile Photo

๐Ÿ”’ Secure Bits ๐Ÿ’ก Have you ever heard of ๐—˜๐—ฆ๐—– ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€? I guess you have. If you're running ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€ (๐—”๐—— ๐—–๐—ฆ) and haven't audited it for ESC misconfigurations โ€” you may be sitting on a

๐Ÿ”’ Secure Bits ๐Ÿ’ก
Have you ever heard of ๐—˜๐—ฆ๐—– ๐˜ƒ๐˜‚๐—น๐—ป๐—ฒ๐—ฟ๐—ฎ๐—ฏ๐—ถ๐—น๐—ถ๐˜๐—ถ๐—ฒ๐˜€? I guess you have.

If you're running ๐—”๐—ฐ๐˜๐—ถ๐˜ƒ๐—ฒ ๐——๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—ผ๐—ฟ๐˜† ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฐ๐—ฎ๐˜๐—ฒ ๐—ฆ๐—ฒ๐—ฟ๐˜ƒ๐—ถ๐—ฐ๐—ฒ๐˜€ (๐—”๐—— ๐—–๐—ฆ) and haven't audited it for ESC misconfigurations โ€” you may be sitting on a