Walter.Legowski
@sadprocessor
Purple PowerShell & Hazy Windows
ID: 4902860751
12-02-2016 23:01:59
2,2K Tweet
4,4K Followers
206 Following
Hey #infosec folks, our Munich Cyber Tactics, Techniques and Procedures (mcttp.de) takes place from 17th to 19th of september in munich with awesome speakers like Oddvar Moe Sean Metcalf BallisKit ++ 📢Everyone who retweets this tweet takes part in a raffle to win a free ticket!📢 #mcttp
Our webinar w/ Andy Robbins & Cody Thomas is just a few days away! Grab your spot now & get ready to hear all about discovery, execution, and remediation of those hybrid Attack Paths. Register today! ▶️ ghst.ly/3YsgB4n
Catch yesterday's webinar w/ Andy Robbins & Cody Thomas discussing discovery, execution, and remediation of hybrid Attack Paths on demand now! 👀: ghst.ly/3YsgB4n
Mythic3.3 has been in Beta for 6 weeks now, so it's time to officially release it! Over the past 6 weeks, Lee Chagolla-Christensen provided a LOT of amazing quality of life requests, so I wanted to highlight them in a new blog posts.specterops.io/mythic-3-3-out…. I think you're gonna really like it :)
Learn how you can now map hybrid Attack Paths from on-prem Active Directory to Azure Entra ID using BloodHound Community Edition & BloodHound Enterprise. Check out Andy Robbins & Justin Kohler's full conversation w/ John Hammond at ghst.ly/4eJ235g
Daniel Bohannon Sabi DEF CON Permiso Security Super awesome presentation!
Part 4 of our Tier Zero webinar series is happening tomorrow! 🙌 Join Jonas Bülow Knudsen, Martin Sohn & Lee Chagolla-Christensen as they discuss the intricate world of Microsoft Exchange Server & AD CS. Register ▶️ ghst.ly/tier0-tw
In this post Andy Robbins introduces PingOneHound, a BloodHound OpenGraph extension that allows users to visualize, audit, and remediate attack paths in their PingOne environment. The blog post also serves as an introduction to the PingOne architecture. specterops.io/blog/2025/10/2…
The Mythic Operator Series by Cody Thomas was really great… Looking forward to watching this 👇