Jason Frank (@jasonjfrank) 's Twitter Profile
Jason Frank

@jasonjfrank

Father. Husband. COO @SpecterOps

ID: 73285507

calendar_today11-09-2009 02:19:50

3,3K Tweet

1,1K Takipçi

942 Takip Edilen

John Pavlovitz (@johnpavlovitz) 's Twitter Profile Photo

Kamala Harris didn't lose, America did. As a nation, we collectively failed her—and in doing so we failed girls and women, the LGBTQ community, people of color, Muslims, Jewish people, immigrants, the sick, the poor, the elderly, the people of Ukraine, and Gaza, and the planet.

ARCHIVED: Jen Easterly (@cisajen) 's Twitter Profile Photo

🇺🇸I want to express my deep gratitude, admiration, and respect to state and local election officials across our nation as well as the hundreds of thousands of poll workers whose tireless efforts made yesterday’s exercise in democracy a success. THANK YOU!

🇺🇸I want to express my deep gratitude, admiration, and respect to state and local election officials across our nation as well as the hundreds of thousands of poll workers whose tireless efforts made yesterday’s exercise in democracy a success. THANK YOU!
ARCHIVED: Jen Easterly (@cisajen) 's Twitter Profile Photo

🇺🇸Congratulations to the entire election community who helped make the 2024 elections safe and secure. Sharing my statement on the security and resilience of the elections.

🇺🇸Congratulations to the entire election community who helped make the 2024 elections safe and secure. Sharing my statement on the security and resilience of the elections.
Chris Thompson (@_mayyhem) 's Twitter Profile Photo

The SO-CON CFP is open 1 more week! I'm biased but I honestly loved the con last year. After only attending DEF CON and BH before, I really enjoyed the smaller conference vibe. I could experience the entire con, interact with everyone there, and 🔥talks sessionize.com/socon-2025

Steven (@0xthirteen) 's Twitter Profile Photo

I’ve always thought Seatbelt was a great situational awareness tool, I created a python implementation of it. Due to the nature of how I expect it to run, it only implements the remote modules, but I hope someone finds it useful. github.com/0xthirteen/Car…

SpecterOps (@specterops) 's Twitter Profile Photo

Happy #Thanksgiving from all of us at SpecterOps! 🍂 We are grateful for our incredible community and we wish you a day full of joy and gratitude.

Happy #Thanksgiving from all of us at SpecterOps! 🍂 

We are grateful for our incredible community and we wish you a day full of joy and gratitude.
Jason Frank (@jasonjfrank) 's Twitter Profile Photo

We are thrilled to be able to offer BloodHound Enterprise at a FedRAMP High accreditation. Thank you to the folks at Palantir and the FedStart offering for your support.

SpecterOps (@specterops) 's Twitter Profile Photo

New blog post alert! 🚨 Lance Cain shares insights from a recent security assessment about the attack surface of Single-Page Applications integrated w/ Azure and how to aid technology professionals in securing their Azure environment. ghst.ly/4gq8E5y

New blog post alert! 🚨  

Lance Cain shares insights from a recent security assessment about the attack surface of Single-Page Applications integrated w/ Azure and how to aid technology professionals in securing their Azure environment. ghst.ly/4gq8E5y
Daniel Heinsen (@hotnops) 's Twitter Profile Photo

i'm on the internet this week. head over to advent.cloudsecuritypodcast.tv to hear me talk about tokens and conditional access

Katie Knowles (@_sigil) 's Twitter Profile Photo

👻 Excited to be presenting "Abusing AUs, Confusing the SOC: Entra ID's Administrative Unit Attack Paths" at #SOCON2025, March 31-April 1! You can register to join me with discount code SOCONSPEAKER20: ghst.ly/socon25-spkr

👻 Excited to be presenting "Abusing AUs, Confusing the SOC: Entra ID's Administrative Unit Attack Paths" at #SOCON2025, March 31-April 1! You can register to join me with discount code SOCONSPEAKER20: ghst.ly/socon25-spkr
Ken Nevers (@k3nundrum) 's Twitter Profile Photo

Make Bloodhound Cool Again: Migrating Custom Queries from Legacy BloodHound to BloodHound CE by link.medium.com/z0KOxdSSUPb

n00py (@n00py1) 's Twitter Profile Photo

Ever run a good BloodHound query but then forget it? Neo4j Desktop on Mac query logs are located here: /Users/UserName/Library/Application Support/Neo4j Desktop/Application/relate-data/dbmss/DatabaseGUID/logs/query.log By default all queries are logged

Jason Frank (@jasonjfrank) 's Twitter Profile Photo

We’re excited to keep pushing forward in eliminating Identity Attack Paths! As orgs grow more complex, Identity Risk is a top concern for security leaders. Proactively shutting down attack paths is the most direct way to reduce the risk of a major breach.

SpecterOps (@specterops) 's Twitter Profile Photo

Introducing Privilege Zones for BloodHound Enterprise! 👏 Now BHE users can define custom security boundaries around business-critical resources & enforce least privilege access across on-prem, cloud & hybrid environments. Learn more: ghst.ly/3FUxGx1

Introducing Privilege Zones for BloodHound Enterprise! 👏

Now BHE users can define custom security boundaries around business-critical resources & enforce least privilege access across on-prem, cloud & hybrid environments.

Learn more: ghst.ly/3FUxGx1
SpecterOps (@specterops) 's Twitter Profile Photo

BloodHound v8.0 is here! 🎉 This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by exposing attack paths throughout your entire tech stack, not just AD/Entra ID. Read more from Justin Kohler: ghst.ly/bloodhoundv8 🧵: 1/7

Jason Frank (@jasonjfrank) 's Twitter Profile Photo

BloodHound 8.0 is here. A big leap forward in identity security prevention. Now we’re able to model attack paths across the entire modern enterprise stack. Our folks will be at #BlackHat next week to show off a few examples. Check it out:

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - github.com/SpecterOps/MSS… - specterops.io/blog/2025/07/2…

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it!
- github.com/SpecterOps/MSS…
- specterops.io/blog/2025/07/2…
SpecterOps (@specterops) 's Twitter Profile Photo

The AD CS security landscape keeps evolving, and so does our tooling. 🛠️ Valdemar Carøe drops info on Certify 2.0, including a suite of new capabilities and refined usability improvements. ghst.ly/45IrBxI

SpecterOps (@specterops) 's Twitter Profile Photo

PDQ SmartDeploy versions prior to 3.0.2046 used static, hardcoded encryption keys for cred storage. Low-privileged users could potentially access admin creds from registry or deployment files. Garrett unpacks his testing in his latest blog post. ghst.ly/4mjyuvw