Vadim Shelest (@alldisc0very) 's Twitter Profile
Vadim Shelest

@alldisc0very

Pentester, Red Team operator

ID: 836850756682723328

calendar_today01-03-2017 08:09:03

2,2K Tweet

487 Takipçi

2,2K Takip Edilen

Gleb Cherbov (@cherboff) 's Twitter Profile Photo

Played around with ChatGPT for pentest reporting. Still a long way from making us unemployed anytime soon. But yeah! It can speed up a boring routine😺

Kuba Gretzky (@mrgretzky) 's Twitter Profile Photo

🚨Evilginx 3.1.0 Release 🪝🐟 Just pushed a small update to Evilginx, fixing few issues, which came up after the 3.0 release in May. Enjoy! github.com/kgretzky/evilg…

🚨Evilginx 3.1.0 Release 🪝🐟

Just pushed a small update to Evilginx, fixing few issues, which came up after the 3.0 release in May.

Enjoy!
github.com/kgretzky/evilg…
Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

Kerberos tickets dumping in pure PowerShell 😍 I simply love such approach. So much more beautiful than loading pre-compiled binary blob. And so much harder to detect... linkedin.com/posts/mzhmo_hi…

Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

🔥 Excited to share my latest Mandiant (part of Google Cloud) Red Team blog on "Escalating Privileges via Third-Party Windows Installers" mandiant.com/resources/blog… Learn how attackers exploit this privilege escalation vector and ways to defend against it. Includes BOF release and a couple CVEs!

sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

(1/2) FYI, #masscan users. The original masscan does NOT include the ‘TCP options’ field with MSS value which is required for some hosts to reply to the packet. The fork by IVRE features the --tcpmss switch that includes the mentioned field for your better scope coverage ⤵️

(1/2) FYI, #masscan users. The original masscan does NOT include the ‘TCP options’ field with MSS value which is required for some hosts to reply to the packet. The fork by <a href="/IvreRocks/">IVRE</a> features the --tcpmss switch that includes the mentioned field for your better scope coverage ⤵️
Kuba Gretzky (@mrgretzky) 's Twitter Profile Photo

Finally my talk from /ˈziːf-kɒn/ is online! 🔥 I try my best to explain what websites could do to protect the users against reverse proxy phishing attacks like Evilginx.🪝🐟 There is also a bonus live demo at the end with some Evilginx Pro secret sauce! 💡 youtube.com/watch?v=C-Fh4s…

Alexander Popov (@a13xp0p0v) 's Twitter Profile Photo

My open source tool for checking the security hardening options of the Linux kernel got a new name: kernel-hardening-checker. Now it supports checking: 1⃣Kconfig options (compile-time) 2⃣Kernel cmdline arguments (boot-time) 3⃣Sysctl parameters (runtime) github.com/a13xp0p0v/kern…

John Althouse (@4a4133) 's Twitter Profile Photo

Announcing JA4+ Network Fingerprinting! JA4+ is a suite of new fingerprinting methods for multiple protocols, detecting everything from entire c2 frameworks, to session hijacking, to reverse SSH shells. blog.foxio.io/ja4-network-fi…

Dominic Chell 👻 (@domchell) 's Twitter Profile Photo

If you're curious on how you might go about avoiding this kind of ETW TI telemetry, check out our latest Nighthawk release, and in particular the new Call Stack Masking feature 🔥mdsec.co.uk/2023/09/nighth…

Orange Cyberdefense's SensePost Team (@sensepost) 's Twitter Profile Photo

Traditional methods of blinding EDR's are to remove hooks. In this post @vikingfr investigates a new technique (and tool) for blinding an EDR in kernel land by limiting connections to the EDR driver's filter communication port. sensepost.com/blog/2023/filt…

Traditional methods of blinding EDR's are to remove hooks. In this post @vikingfr investigates a new technique (and tool) for blinding an EDR in kernel land by limiting connections to the EDR driver's filter communication port. sensepost.com/blog/2023/filt…
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

My latest blog post about avoiding kernel triggered EDR memory scans via Caro-Kann PoC is now released: 🔥 r-tec.net/r-tec-blog-pro…