Leo Loobeek (@leoloobeek) 's Twitter Profile
Leo Loobeek

@leoloobeek

Penetration Tester | Adaptable Adversary | github.com/leoloobeek | Thoughts and tweets are my own

ID: 53517553

linkhttps://adapt-and-attack.com/ calendar_today03-07-2009 22:25:04

570 Tweet

1,1K Followers

447 Following

Jackson T. (@jackson_t) 's Twitter Profile Photo

🧠 Mental models are useful for developing solutions and stimulating thinking. In this post, I discuss some personal mental models I've found useful for offensive capability R&D, which can also generalize to understanding opponent processes in InfoSec. jackson-t.ca/operational-me…

Cube0x0 (@cube0x0) 's Twitter Profile Photo

SharpMapExec update * Minor logic improvements * /system now gives stdout/stderr and disables AMSI * /delegwalk executes in a delegated process context sorted by unique users (useful for shared workstations/servers) * /comsvcs automatically parses LSASS github.com/cube0x0/SharpM…

monoxgas (@monoxgas) 's Twitter Profile Photo

Arbitrary shellcode injection in Perl for MacOS. I never formalized it, but assume it might be helpful to someone. gist.github.com/monoxgas/c0b0f…

Dima (@dawouw) 's Twitter Profile Photo

New blog post: how we created a phishing document signed by Microsoft - from Microsoft with love 😉 CVE-2021-28449 h/t Pieter Ceelen Outflank outflank.nl/blog/2021/12/0…

bohops (@bohops) 's Twitter Profile Photo

[New Tool] RogueAssemblyHunter 🛡️ Rogue Assembly Hunter is a utility for discovering 'interesting' .NET CLR modules in running processes github.com/bohops/RogueAs… #BlueTeam #ThreatHunting

Jonas L (@jonaslyk) 's Twitter Profile Photo

github.com/jonaslyk/temp/… My webdav based reflective loader/per process devicemap based dll injector POC is by now usable. I would really like to have a OOP wrapper for NT- designing such is surprisingly difficult, but this approach shows potential especially considering simple

bohops (@bohops) 's Twitter Profile Photo

AccChecker is a pretty interesting #lolbin (+ AppLocker Bypass) from the Win SDK. Load a managed DLL with this cmd: AccCheckConsole.exe -window "Untitled - Notepad" C:\path\to\your\lolbas.dll More info in this gist: gist.github.com/bohops/2444129…

Matt Eidelberg (@tyl0us) 's Twitter Profile Photo

Introducing Ivy a unique, stealthy method of executing shellcode using VBA and COM objects without dropping office macro documents to disk. Ivy also allows for the unhooking EDRs from the VBA environment. Check it out: github.com/optiv/Ivy 👀 #netsec #redteam #EDR #evasion

Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

New post is up on the @trustedsec blog, this time looking at how to use ProcessDeviceMap to load arbitrary DLL's into a process on start. trustedsec.com/blog/object-ov…

Karl (@kfosaaen) 's Twitter Profile Photo

Packt currently has a few books (including Penetration Testing Azure for Ethical Hackers) on sale on Amazon. Use code “20SECURITY” to get the 20% off discount - packt.link/NEBPw

Jackson T. (@jackson_t) 's Twitter Profile Photo

In this post, I discuss one key difference in the thinking between sophisticated adversaries and many of the red teams that try to simulate them, as well as what that means for tradecraft and tooling. jackson_t.gitlab.io/it-depends.html

In this post, I discuss one key difference in the thinking between sophisticated adversaries and many of the red teams that try to simulate them, as well as what that means for tradecraft and tooling.

jackson_t.gitlab.io/it-depends.html
OtterHacker (@otterhacker) 's Twitter Profile Photo

An interesting post about Kernel Callback used by EDR. It’s a nice article to read if you want to dive into EDR Kernel Callbacks bypass. Thanks Zach Stein for the blogpost ! :) The part about rui evil.sys driver and experiments is really nice ! :) synzack.github.io/Blinding-EDR-O…

Wojciech Reguła (@_r3ggi) 's Twitter Profile Photo

I am sharing the slides from my latest presentation: “0-Day Up Your Sleeve – Attacking macOS Environments” I gave at NULLCON 👉securing.pl/en/presentatio…

I am sharing the slides from my latest presentation: “0-Day Up Your Sleeve – Attacking macOS Environments” I gave at <a href="/nullcon/">NULLCON</a> 
👉securing.pl/en/presentatio…
Kiwids (@mhskai2017) 's Twitter Profile Photo

I wrote a blog post that talks about how we can abuse yet another Chrome Remote Debugging feature to "stalk" end users. posts.specterops.io/stalking-insid…

moo (@moo_hax) 's Twitter Profile Photo

Fun little DLL making a request out to an LLM. Still have some troubleshooting left with sRDI. While it’s ultimately just a we request, LLMs + Ops os fun to think about.

Fun little DLL making a request out to an LLM. Still have some troubleshooting left with sRDI. While it’s ultimately just a we request, LLMs + Ops os fun to think about.
moo (@moo_hax) 's Twitter Profile Photo

Before NVIDIA, I was lucky enough to work with Ram Shankar Siva Kumar and Hyrum Anderson at Microsoft. We got to write tooling, risk assessments, and attacks IRL. MLSec seems new, but their work on this topic is all over the Security community. If you’re looking to orient yourself to the current

Dave (@dtpkll) 's Twitter Profile Photo

Minnesota Vikings Kevin O'Connell Phil Mackey 🎙 Dustin Baker Season over. 24 hours after the most devastating event of his career, OUR quarterback doesn’t sit home feeling sorry for himself. No, he attends the Kids Club Trick-Or-Treat Trail in Egan. That’s our QB. #Vikings

<a href="/Vikings/">Minnesota Vikings</a> <a href="/KevOC7/">Kevin O'Connell</a> <a href="/PhilMackey/">Phil Mackey 🎙</a> <a href="/DustBaker/">Dustin Baker</a> Season over.  24 hours after the most devastating event of his career, OUR quarterback doesn’t sit home feeling sorry for himself.  No, he attends the Kids Club Trick-Or-Treat Trail in Egan.  That’s our QB.  #Vikings
Jason Lang (@curi0usjack) 's Twitter Profile Photo

Welcome to my 2023 Irreverant Red Team TTP Wrap Up (Trends, Trolls, Predictions) It's likely some of these will ruffle feathers, but hackers break things right? 😁 🧵👇

Leo Loobeek (@leoloobeek) 's Twitter Profile Photo

After trying LangChain, then Haystack, Rigging has been the best option so far. Removes all the unnecessary abstractions and allows you to focus on building an LLM powered toolset.