Techno_Rave1911 (@techno_rave1911) 's Twitter Profile
Techno_Rave1911

@techno_rave1911

IT Security Manager & IT Manager For Several Healthcare and Financial Institutes | InfoSec Community | Offensive and Defense side of IT Security.

ID: 995102347163521024

calendar_today12-05-2018 00:44:22

2,2K Tweet

438 Takipçi

2,2K Takip Edilen

TrustedSec (@trustedsec) 's Twitter Profile Photo

Think you know WMI? Do you know how to write your own WMI provider? Senior Research Analyst Adam Todd is back to demonstrate how to create your own WMI provider for fun and profit. hubs.la/Q01dc6p70

sn🥶vvcr💥sh (@snovvcrash) 's Twitter Profile Photo

[#Tooling ⚔️] 🧵 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: github.com/snovvcrash/DIn… Main credits to mgeeky | Mariusz Banach, Rasta Mouse and S3cur3Th1sSh1t for their great tools and blogs which I heavily relied on here. #redteam #maldev

[#Tooling ⚔️] 🧵 (1/6) A thread of integrating #shellcode #fluctuation technique into DInjector: github.com/snovvcrash/DIn…

Main credits to <a href="/mariuszbit/">mgeeky | Mariusz Banach</a>, <a href="/_RastaMouse/">Rasta Mouse</a> and <a href="/ShitSecure/">S3cur3Th1sSh1t</a> for their great tools and blogs which I heavily relied on here.

#redteam #maldev
Trimarc (@trimarcsecurity) 's Twitter Profile Photo

Want to learn about the "Top 10 Ways to Improve Active Directory Security Quickly"? Sean Metcalf Sean Metcalf, Tyler Robinson Tyler Robinson, & Darryl Baker I break Windows.... cover AD attacks & improving AD security June 23rd 3pm-4:15pm (ET) Register here: trimarc.co/TWRAD202206tw

Want to learn about the "Top 10 Ways to Improve Active Directory Security Quickly"?

Sean Metcalf <a href="/PyroTek3/">Sean Metcalf</a>, Tyler Robinson <a href="/tyler_robinson/">Tyler Robinson</a>, &amp; Darryl Baker <a href="/DFIRdeferred/">I break Windows....</a> cover AD attacks &amp; improving AD security

June 23rd
3pm-4:15pm (ET)

Register here: 
trimarc.co/TWRAD202206tw
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I recommend mquery to test #YARA rules for false positives on a big corpus of indexed goodware We've even integrated it into our internal VSCode extension via API so that we can trigger a query and get results right into our editors github.com/CERT-Polska/mq…

I recommend mquery to test #YARA rules for false positives on a big corpus of indexed goodware

We've even integrated it into our internal VSCode extension via API so that we can trigger a query and get results right into our editors

github.com/CERT-Polska/mq…
mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

🔥Working hard on a public release of my Malware Dev CI/CD toolkit ☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators ☢️RedBackdoorer - PE shellcode injection via 6 techniques ☢️RedWatermarker - IOC injector for implants tracking Already available to my sponsors 😁✨

🔥Working hard on a public release of my Malware Dev CI/CD toolkit

☢️ProtectMyTooling - Multi-Packer, supporting 23+ obfuscators
☢️RedBackdoorer - PE shellcode injection via 6 techniques
☢️RedWatermarker - IOC injector for implants tracking

Already available to my sponsors 😁✨
Adam Svoboda (@adamsvoboda) 's Twitter Profile Photo

Want to dump LSASS but dealing with MDE/ATP and ASR rules? Learn how to extract a list of whitelisted exclusion paths from Defender's signature update files in this blog post: adamsvoboda.net/extracting-asr…

Chetan Nayak (Brute Ratel C4 Author) (@ninjaparanoid) 's Twitter Profile Photo

Going forward Brute Ratel will focus only on evasions and Red Team and not the purple team counterpart. Anything that does not contribute to Red Team will be Open Sourced. The PowerShell loader which was used in BRc4 is now added here: github.com/paranoidninja/…

S4ntiagoP (@s4ntiago_p) 's Twitter Profile Photo

New update to nanodump! You can now force WerFault.exe to dump LSASS for you. Thanks to Asaf Gilboa for the original research. github.com/helpsystems/na…

mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

☢️ I'm so excited - just issued my first blog post☢️ As promised - sharing my WarCon slides deck on: mgeeky.tech/warcon-2022-mo… Power of positive feedback made me publish them during my first day of holidays (●'◡'●) Let me know if you like it 🔥

☢️ I'm so excited - just issued my first blog post☢️
As promised - sharing my <a href="/WarConPL/">WarCon</a> slides deck on:

mgeeky.tech/warcon-2022-mo…

Power of positive feedback made me publish them during my first day of holidays (●'◡'●) 

Let me know if you like it 🔥
ghostlulz (@ghostlulz1337) 's Twitter Profile Photo

Cool blog on abusing callback functions to execute shellcode. There are so many windows APIs that can be leveraged to execute your shellcode. Really cool stuff! ropgadget.com/posts/abusing_… #redteam #infosec

Cool blog on abusing callback functions to execute shellcode. There are so many windows APIs that can be leveraged to execute your shellcode. Really cool stuff!

ropgadget.com/posts/abusing_…

#redteam #infosec
m3rcer (@al3x_m3rcer) 's Twitter Profile Photo

Here's the official release of Chisel-Strike: A .NET XOR encrypted Cobalt Strike Aggressor implementation for chisel to utilize faster proxy and advanced socks5 capabilities. github.com/m3rcer/Chisel-… #RedTeaming #CobaltStrike #Pentesting

pre.empt (@preemptdev) 's Twitter Profile Photo

🧵In part 5 of the blog series we're looking at implementing and bypassing common EDR functionality. As a part of this we look at Kernel Callbacks, Hooks, and Thread Call Stacks: pre.empt.dev/posts/maelstro… 1/3

mpgn (@mpgn_x64) 's Twitter Profile Photo

Execute commands as another user w/t dumping LSASS or touching the ADCS server ? Thanks to Aurélien Chalot a new module has been added to CrackMapExec 🚀 The module will impersonate any logged on user to exec command as "this" user (system, domain user etc) 🔥

Execute commands as another user w/t dumping LSASS or touching the ADCS server ? Thanks to <a href="/Defte_/">Aurélien Chalot</a>  a new module has been added to CrackMapExec 🚀

The module will impersonate any logged on user to exec command as "this" user (system, domain user etc) 🔥
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

New blog and tool: Introducing ROADtools Token eXchange (roadtx) - Automating Azure AD authentication, Primary Refresh Token (ab)use and device registration. Blog: dirkjanm.io/introducing-ro… Code: github.com/dirkjanm/ROADt… Some features in screenshot attached.

New blog and tool: Introducing ROADtools Token eXchange (roadtx) - Automating Azure AD authentication, Primary Refresh Token (ab)use and device registration.

Blog: dirkjanm.io/introducing-ro…
Code: github.com/dirkjanm/ROADt…
Some features in screenshot attached.
x86matthew (@x86matthew) 's Twitter Profile Photo

StealthHook - A method for hooking functions without modifying memory protection. This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception. x86matthew.com/view_post?id=s…

StealthHook - A method for hooking functions without modifying memory protection.

This tool automatically discovers writable global pointers/vtable entries that are nested within the target function, enabling stealthy function hooking and interception.

x86matthew.com/view_post?id=s…
Joe Vest (@joevest) 's Twitter Profile Photo

More updates. You can now create and use a custom template `python random_c2profile.py --template templates/my_template.jinja`. This should allow you to control your own OPSEC needs and still use random data. github.com/threatexpress/…

Hacking Your Health (@wehackhealth) 's Twitter Profile Photo

Interesting one - like ♥️ if you are trying to gain muscle and retweet 🔁 if you are trying to lose weight… #wehackhealth

Hacking Your Health (@wehackhealth) 's Twitter Profile Photo

You have 105 hours to save some $$. For the whole month of October we are running a discount with code - password1234 at check out. hackingyourhealth.com/supplements Retweet this tweet for a chance to win a full stack pre and protein... #wehackhealth

You have 105 hours to save some $$. 

For the whole month of October we are running a discount with code - password1234 at check out. 

hackingyourhealth.com/supplements 

Retweet this tweet for a chance to win a full stack pre and protein...

#wehackhealth