Rene Loskan (@druvora) 's Twitter Profile
Rene Loskan

@druvora

ID: 1404051178325938178

calendar_today13-06-2021 12:21:07

39 Tweet

40 Followers

382 Following

CSCG (@c_s_c_g) 's Twitter Profile Photo

Only four days left until the start of the #CSCG2023 on the 1st of March. In this year the qualification will only last for two months. We have amazing Partners Stadt Ulm CODE WHITE GmbH Find out more on: cscg.de/teilnehmen Happy hacking!

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We're pleased to announce that we donated a total of $29,500 from vulnerability disclosure rewards to charities this year. Thanks to all colleagues who made this possible and hacky christmas everybody!

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Struggeling to get those precious certificates with #certipy and AD CS instances that do not support web enrollment and do not expose CertSvc via RPC? Tobias Neitzel has you covered and added functionality to use DCOM instead of good old RPC #redteaming github.com/ly4k/Certipy/p…

niph (@niph_) 's Twitter Profile Photo

If you are struggling to crack AES based TGS hashes, it might be that you are using the wrong salt. This impacket PR will ensure that you get the right salt value by sending an additional AS_REQ packet. github.com/fortra/impacke…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

We've received insider information from a reliable source that Kurts Maultaschenfabrikle will be expanding and securing their IT in the coming weeks. So either act fast and get ahead on apply-if-you-can.com or wait for the new challenges. Or better yet, do both 🤓

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

BeanBeat has been aquired by Kurts Maultaschenfabrikle! You don't know what that means? Head over to apply-if-you-can.com to find out in challenges that, without exception, stem from real-world vulns #uncompromisingRealism #finestHacking

SpecterOps (@specterops) 's Twitter Profile Photo

We are BACK with another #BloodHoundBasics post, this week courtesy of Andy Robbins. ICYMI: The BloodHound BACK button is BACK. Just use your browser's BACK button to go BACK. 🔙

Toffy (@toffyrak) 's Twitter Profile Photo

I have just released my first tool : GPOHound 🚀 GPOHound is an offensive tool for dumping and analysing GPOs. It leverages BloodHound data and enriches it with insights extracted from the analysis. 🔗Check it out here: github.com/cogiceo/GPOHou…

I have just released my first tool : GPOHound 🚀
 
GPOHound is an offensive tool for dumping and analysing GPOs. It leverages BloodHound data and enriches it with insights extracted from the analysis.

🔗Check it out here: github.com/cogiceo/GPOHou…
Yehuda Smirnov (@yudasm_) 's Twitter Profile Photo

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…

Yuval Gordon (@yug0rd) 's Twitter Profile Photo

Many missed this on #BadSuccessor: it’s also a credential dumper. I wrote a simple PowerShell script that uses Rubeus to dump Kerberos keys and NTLM hashes for every principal-krbtgt, users, machines. no DCSync required, no code execution on DC.

akano (@princessakano) 's Twitter Profile Photo

warrior - sysadmin rogue - pentest/red team hunter - threat hunter mage - automation devops priest - compliance/grc druid - cloud eng shaman - devops generalist paladin - help desk warlock - sre

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - github.com/SpecterOps/MSS… - specterops.io/blog/2025/07/2…

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it!
- github.com/SpecterOps/MSS…
- specterops.io/blog/2025/07/2…
Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (Aurélien Chalot), including instructions for reproducing the test environment yourself. (link below)

Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (<a href="/Defte_/">Aurélien Chalot</a>), including instructions for reproducing the test environment yourself.

(link below)
mbg (@mbrg0) 's Twitter Profile Photo

we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us use them to dump full crm records these are autonomous agents.. no human in the loop #DEFCON #BHUSA Tamir Ishay Sharbat

we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us use them to dump full crm records

these are autonomous agents.. no human in the loop

#DEFCON #BHUSA <a href="/tamirishaysh/">Tamir Ishay Sharbat</a>
RedTeam Pentesting (@redteampt) 's Twitter Profile Photo

👀Turns out MS-EVEN can do a lot more than NULL auth: In addition to leaking environment variables, it is possible to coerce authentication from arbitrary logged on users* 🤯 *If you are willing to trigger Windows Defender.

Pirat_Nation 🔴 (@pirat_nation) 's Twitter Profile Photo

Microsoft Teams will start snitching to your boss when you’re not in the office Microsoft is rolling out an update that will let Teams report when you're in the office—and when you're not.

Microsoft Teams will start snitching to your boss when you’re not in the office

Microsoft is rolling out an update that will let Teams report when you're in the office—and when you're not.