Darren McDonald (@r3n5k1) 's Twitter Profile
Darren McDonald

@r3n5k1

Currently into Rust, phishing, redteaming, and hardware.

ID: 380798609

linkhttp://cryptic.red calendar_today27-09-2011 07:44:37

99 Tweet

105 Followers

95 Following

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

After years of making do with a mixture of scapy, wireshark, and the existing rtpnatscan tool I have finally written an RTP Bleed exploit. Before running on your client's SBCs, be warned it can be very disruptive. github.com/CR-DMcDonald/v…

Luke Rogerson (@nullmode_) 's Twitter Profile Photo

13 hours left on the early bird pricing on my report writing course! Grab it now for life time access while it's cheap m8s training.zeropointsecurity.co.uk/courses/the-ar…

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

#emfcamp was great. My plans at listening to all the talks was derailed by meeting and talking with so many awesome people.

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

If anyone else has fallen down the rabbit hole of bypassing IR touch-less exit sensors, I'm starting to document the signal patterns on a github repo. If you've got data for other models or different patterns and timings please consider adding them. github.com/CR-DMcDonald/I…

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

Just released my tool LetItRust. Inspired by the tool LetItGo, it uses exchange API to get other domains in the same Microsoft tenant but it uses your Gandi PAT/API key to check if the domain can purchased. Great for cloud reviews, osint, and redteaming. github.com/CR-DMcDonald/l…

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

Started taking spectra of IR touch-less exit sensors to make sure I'm getting the best possible range when bypassing them. The assumption is they all work at 940nm, but seems worth checking. NT200 is up first.

Started taking spectra of IR touch-less exit sensors to make sure I'm getting the best possible range when bypassing them. The assumption is they all work at 940nm, but seems worth checking.

NT200 is up first.
Craig S. Blackie (@craigsblackie) 's Twitter Profile Photo

Myself and 00Waz are releasing the Desktop Decoder today, a useful tool to easily display an encoded hex value of the Wiegand data transmitted over the wire from an Access Control reader. Great for anyone into PACs! github.com/craigsblackie/…

BSides Basingstoke (@bsidesbsk) 's Twitter Profile Photo

We're excited to announce our first speaker for the October mini meet! Darren McDonald will be delivering his talk, "Breaking the Shield: Bypassing FortWeb WAFs and Zscaler ZIA"

Dmitrii Kovanikov (@chshersh) 's Twitter Profile Photo

Docker is stupid. “Sorry, we can’t deploy a single statically linked executable of size 10 MB, so LET’S JUST SHIP GIGABYTES OF DATA CONTAINING AN ENTIRE OS WITH ALL DEPENDENCIES FOR EVERY SINGLE SERVICE”

SANS Offensive Operations (@sansoffensive) 's Twitter Profile Photo

.Rich Warren & Johnny Fishcake are discussing how to exploit corporate VPN clients for remote root & SYSTEM shells. Join to see live demos on Windows & macOS vulnerabilities & how attackers gain control w/ just one click. Register Free: sans.org/u/1vBt #SANSHackFest

.<a href="/buffaloverflow/">Rich Warren</a> &amp; <a href="/johnnyspandex/">Johnny Fishcake</a> are discussing how to exploit corporate VPN clients for remote root &amp; SYSTEM shells. Join to see live demos on Windows &amp; macOS vulnerabilities &amp; how attackers gain control w/ just one click.

Register Free: sans.org/u/1vBt

#SANSHackFest
Darren McDonald (@r3n5k1) 's Twitter Profile Photo

We've been looking at FortiWeb Cloud IaaS WAFs. There's a very easy bypass which allows attackers passed all your logging and WAF rules if you've not implemented the origin lock feature. youtu.be/XtAOpiKu3u0?si…

Luke Rogerson (@nullmode_) 's Twitter Profile Photo

Just released a few new courses - the start of my "Code Review & Architecture Fundamentals" series. 33% off on two of the courses until EOD 2nd Dec. Big thanks to CourseStack for their support in making this possible! 👉 ogsec.co.uk/2024/11/13/cod…

Darren McDonald (@r3n5k1) 's Twitter Profile Photo

My first CVE with AmberWolf has recently been resolved by Dell. Memory dumps on ThinOS Wyse terminals are not stored encrypted despite the use of FDE. blog.amberwolf.com/blog/2025/june…