Justin Bui (@slyd0g) 's Twitter Profile
Justin Bui

@slyd0g

I break computers and skateboards | red/blue/whatever let's make security better | Offensive Security @SnowflakeDB | Prev @Zoom @SpecterOps

ID: 520809476

linkhttps://slyd0g.medium.com/ calendar_today10-03-2012 23:02:15

1,1K Tweet

4,4K Takipçi

347 Takip Edilen

Graham Helton (@grahamhelton3) 's Twitter Profile Photo

I see we're doing the quarterly open source tools/research debate again. I'll just say this: Phishing got much harder when Kuba Gretzky released evilnginx AD got more secure after SpecterOps released Certified Pre-Owned AD got more secure when Tim Medin @timmedin.bsky.social 🇺🇦 showed us kerberoasting

Dylan Tran (@d_tranman) 's Twitter Profile Photo

Had a lot of fun digging into COM stuff with bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…

Justin Bui (@slyd0g) 's Twitter Profile Photo

My team is hiring a high-mid to senior engineer! You’ll be joining a brilliant team that delivers high-impact assessments with lots of visibility :) Please apply if interested and let me know if you have any questions! careers.snowflake.com/us/en/job/SNCO…

Graham Helton (@grahamhelton3) 's Twitter Profile Photo

Before moving from my role at Google to Snowflake I sat down and did a braindump of all the guidelines that I follow (or followed at one point and wanted to reintroduce). For those interested, here are the ~34 guidelines that made the cut

Justin Bui (@slyd0g) 's Twitter Profile Photo

figma.com/blog/rolling-o… This is so cool :) "Santa also supports file access authorization (FAA), restricting access to specific files and ensuring ... approved applications ... can interact with them. We’ve leveraged this to secure browser cookies on Figma laptops"

Justin Bui (@slyd0g) 's Twitter Profile Photo

Some Python code that leverages FFI to interface with macOS libraries to pull the unique hardware UUID. An alternative to the system_profiler binary that may be useful :) gist.github.com/slyd0g/fec25af…

Nick Frichette (@frichette_n) 's Twitter Profile Photo

ec2-instance-connect:SendSSHPublicKey might be my on of my favorite API calls. Have privilege at the control plane and want to start popping boxes? I have a solution for you!

Jared Atkinson (@jaredcatkinson) 's Twitter Profile Photo

Data is gold and Snowflake is full of it. BloodHound now understands Snowflake’s access model. Map who can reach your critical data, and how they’d do it. Check it out: github.com/SpecterOps/Sno…

Data is gold and Snowflake is full of it.

BloodHound now understands Snowflake’s access model. Map who can reach your critical data, and how they’d do it.

Check it out: github.com/SpecterOps/Sno…
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Just posted my DEF CON slides (talk #1): "Mastering Apple's Endpoint Security for Advanced macOS Malware Detection" Writing 🍎 security software? You should be using Endpoint Security! But its advanced features are rather nuanced & often misunderstood 🫣 speakerdeck.com/patrickwardle/…

Richie Cyrus (@rrcyrus) 's Twitter Profile Photo

This is an opportunity to join a great team with far-reaching impact across Apple! If you’ve been interested in or are currently writing detection as code at scale, please take a look. jobs.apple.com/en-il/details/…

Jonathan Bar Or (JBO) 🇮🇱🇺🇸🇺🇦🎗️ (@yo_yo_yo_jbo) 's Twitter Profile Photo

How do you read from the clipboard in macOS without anyone noticing? Just read from a UUID file under "~/Library/Group\ Containers/group.com.apple.coreservices.useractivityd/shared-pasteboard/" (requires the ability to read from Group Containers!, e.g. via Full Disk Access)

How do you read from the clipboard in macOS without anyone noticing? Just read from a UUID file under
"~/Library/Group\ Containers/group.com.apple.coreservices.useractivityd/shared-pasteboard/"

(requires the ability to read from Group Containers!, e.g. via Full Disk Access)
Valentino (@valent1nee) 's Twitter Profile Photo

I'm really excited to share my first research article related to hacking Google Gemini! buganizer.cc/hacking-gemini… #bugSWAT #GoogleVRP