J (@fuseyjz) 's Twitter Profile
J

@fuseyjz

ID: 824610728539615232

calendar_today26-01-2017 13:31:33

179 Tweet

112 Followers

710 Following

Felix (@felixw3000) 's Twitter Profile Photo

Today, I'm releasing Process Spawn Control (PsC). PsC suspends newly launched processes, and gives the analyst the option to either keep the process suspended, or to resume it: github.com/felixweyne/Pro… ↪️Demo use case: execute an Emotet Office dropper step by step 🧐

Luke Jennings (@jukelennings) 's Twitter Profile Photo

Seems my #bluehatv18 talk is now up. If you’re interested in memory resident implant techniques a couple of #sysmon and #atp bypasses then check it out youtu.be/02fL2xpR7IM

F-Secure Countercept (@countercept) 's Twitter Profile Photo

#ThreatHuntThursday: Luke Jennings explores how Gargoyle-inspired techniques can be leveraged within the .NET framework to hide in-memory .NET payloads from memory scanning techniques....plus how to detect it - countercept.com/blog/gargoyle-… | #security

#ThreatHuntThursday: <a href="/jukelennings/">Luke Jennings</a> explores how Gargoyle-inspired techniques can be leveraged within the .NET framework to hide in-memory .NET payloads from memory scanning techniques....plus how to detect it - countercept.com/blog/gargoyle-… | #security
Jake Williams (@malwarejake) 's Twitter Profile Photo

Yesterday, Microsoft announced there's a remotely exploitable heap overflow in MS DNS on Server 2012R2 and later. Infosec, how are we not talking about this?! portal.msrc.microsoft.com/en-US/security…

Chris Long (@centurion) 's Twitter Profile Photo

If you've ever wanted to know more about using osquery for process and socket auditing on Linux, we just released a two-part blog post series on it today! Pt. 1: medium.com/palantir/audit… Pt. 2: medium.com/palantir/audit…

Roberto Rodriguez 🇵🇪 (@cyb3rward0g) 's Twitter Profile Photo

Following on the the latest release of THE-HELK , I wanted to share a little bit of my experience while integrating the Sigma project via Elastalert. I hope this post helps to provide some more details about it! KSQL post is next 😉🦌🎄🎄#ThreatHunting 🍻 posts.specterops.io/what-the-helk-…

Chris Sanders 🔎 🧠 (@chrissanders88) 's Twitter Profile Photo

To celebrate the first Investigation Theory offering of 2019, I'm giving away a free seat in the online class that starts Monday. To enter, just retweet this tweet! I'll pick a winner on Thursday night. You can read about Investigation Theory here: networkdefense.co/courses/.

F-Secure Countercept (@countercept) 's Twitter Profile Photo

#ThreatHuntThursday: Read our new blog post on how to hunt for SILENTTRINITY - a recently released post-exploitation agent powered by IronPython and C# - countercept.com/blog/hunting-f… | #threathunting #infosec

#ThreatHuntThursday: Read our new blog post on how to hunt for SILENTTRINITY - a recently released post-exploitation agent powered by IronPython and C# - countercept.com/blog/hunting-f… | #threathunting #infosec
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

New blog post added looking at how to spoof arguments like Cobalt Strike’s “argue” command, and a weird bug which can stop ProcessExplorer from giving the game away. blog.xpnsec.com/how-to-argue-l…

Martin Korman (@martinkorman) 's Twitter Profile Photo

medium.com/dfir-dudes/reg… I'm releasing Regipy: an OS independent python library for parsing offline registry hives, with a lot of awesome features! #DFIR

Roberto Rodriguez 🇵🇪 (@cyb3rward0g) 's Twitter Profile Photo

Releasing Mordor 😈📜! A repo of pre-recorded security events generated by emulated adversarial techniques in the form of JSON files for easy consumption! Jose Rodriguez 🇵🇪 & I wanted to facilitate the development & testing of data analytics 🍻 #ThreatHunting github.com/Cyb3rWard0g/mo…

Releasing Mordor 😈📜! A repo of pre-recorded security events generated by emulated adversarial techniques in the form of JSON files for easy consumption! <a href="/Cyb3rPandaH/">Jose Rodriguez 🇵🇪</a> &amp; I wanted to facilitate the development &amp; testing of data analytics 🍻 #ThreatHunting  github.com/Cyb3rWard0g/mo…
Richie Cyrus (@rrcyrus) 's Twitter Profile Photo

Today I'm releasing a tool I've been working on for a while, which aids hunters interested in proactive detection of malicious activity in macOS environments. posts.specterops.io/introducing-ve…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Senior Security Consultant Oddvar Moe gives us a look through the eyes of a #hacker using phishing by leveraging Azure Information Protection (AIP) in his latest #blog Next Gen Phishing - Leveraging Azure Information Protection - TrustedSec hubs.ly/H0hBHts0

Roberto Rodriguez 🇵🇪 (@cyb3rward0g) 's Twitter Profile Photo

Excited to release the first parts of my #ThreatHunting w/ Project Jupyter notebooks series 😊💜 You will go from creating your first notebook to leveraging Apache Spark SQL to JOIN relevant data sources to detect lateral movement 🍻 THE-HELK SpecterOps posts.specterops.io/threat-hunting…

Ian Hellen (@ianhellen) 's Twitter Profile Photo

Announcing msticpy - Python security tools for #Jupyter. We've been building tools to support defender hunting/investigations in Jupyter notebooks. Check out the overview here techcommunity.microsoft.com/t5/Azure-Senti…

Announcing msticpy - Python security tools for #Jupyter. We've been building tools to support defender hunting/investigations in Jupyter notebooks. Check out the overview here techcommunity.microsoft.com/t5/Azure-Senti…
SpecterOps (@specterops) 's Twitter Profile Photo

Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: github.com/specterops/at-… Enjoy! For information about our current training offerings, information can be found here: specterops.io/how-we-help/tr… (4/4)

Cody Thomas (@its_a_feature_) 's Twitter Profile Photo

Slack is an integral component for many companies these days, so Julian Catrambone Lee Chagolla-Christensen and I wanted to share how we've been abusing it in Red Team operations to keep an eye on our target and get some valuable intel: posts.specterops.io/abusing-slack-…

Slack is an integral component for many companies these days, so <a href="/n0pe_sled/">Julian Catrambone</a> <a href="/tifkin_/">Lee Chagolla-Christensen</a> and I wanted to share how we've been abusing it in Red Team operations to keep an eye on our target and get some valuable intel:
posts.specterops.io/abusing-slack-…