Ring3API 🇺🇦 (@ntlmrelay) 's Twitter Profile
Ring3API 🇺🇦

@ntlmrelay

#ThreatHunting / #BlueTeam engineer. I'm just looking for traces in the logs. Reading and retweeting cool stuff.
MITRE ATT&CK Defender:CTI,SOCAsses,AE,PTM,THDE.

ID: 394156689

linkhttps://twitter.com/ calendar_today19-10-2011 17:12:20

14,14K Tweet

6,6K Takipçi

2,2K Takip Edilen

VMRay (@vmray) 's Twitter Profile Photo

🔥 We uncovered notable shifts in how threat actors stage payload delivery, including emerging combinations of preferred loader, dropper and payload pairings. We think these insights reveal interesting patterns that were previously not shared, and provide a view of the

🔥 We uncovered notable shifts in how threat actors stage payload delivery, including emerging combinations of preferred loader, dropper and payload pairings. 

We think these insights reveal interesting patterns that were previously not shared, and provide a view of the
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

Many commented that determining when a breach began depends on how long the victim retains its logs. That’s simply not true. Log data is just one piece of forensic evidence, and often not even the most reliable. Analysts can build timelines from dozens of other artifacts – file

AlexandruC4 (@alexandruc4) 's Twitter Profile Photo

Europol and Latvian law enforcement dismantled five servers, seized 1,200 SIM box devices and 40,000 active SIM cards. The criminals were linked to over 1,700 cyber fraud cases in Austria and 1,500 in Latvia, causing losses of several million euros, including EUR 4.5 million in

Logan Goins (@_logangoins) 's Twitter Profile Photo

I feel like Yuval Gordon's briefly mentioned new dMSA account takeover mechanism in his last blog didn't get enough attention. A new account takeover mechanism is on the horizon. I wrote a blog detailing it, releasing with a new BOF I wrote called BadTakeover specterops.io/blog/2025/10/2…

Elastic (@elastic) 's Twitter Profile Photo

Stop wrestling with ES|QL syntax. The new Python query builder in the Elasticsearch client does the heavy lifting for you. 👉 Try it out on #ElasticSearchLabs: go.es.io/3WP6KU8

eversinc33 🤍🔪⋆。˚ ⋆ (@eversinc33) 's Twitter Profile Photo

Wrote a little tracer I found helpful when analyzing obfuscated .NET - might be useful for you, might be not. Have fun :3 github.com/eversinc33/Net…

SpecterOps (@specterops) 's Twitter Profile Photo

Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

The blog links a free NetNTLMv1 cracking site (ntlmv1.com) whose operator appears tied to Chengdu Mistiny Ltd., a company in Sichuan, China. I don't know if you really want to let them crack your hash values.

The blog links a free NetNTLMv1 cracking site (ntlmv1.com) whose operator appears tied to Chengdu Mistiny Ltd., a company in Sichuan, China. I don't know if you really want to let them crack your hash values.
🕳 (@sekurlsa_pw) 's Twitter Profile Photo

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. research.google/resources/data… Dataset is available for download at: ▪️console.cloud.google.com/storage/browse… [Login required] ▪️gs://net-ntlmv1-tables

Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. 
research.google/resources/data…
Dataset is available for download at:
▪️console.cloud.google.com/storage/browse… [Login required]
▪️gs://net-ntlmv1-tables
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

EDR-Redir uses a Bind Filter (mini filter bindflt.sys) and the Windows Cloud Filter API (cldflt.sys) to redirect the Endpoint Detection and Response (EDR) 's working folder to a folder of the attacker's choice github.com/TwoSevenOneT/E…

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

🛠️ SockTail - Lightweight binary that joins a device to a Tailscale network and exposes a local SOCKS5 proxy. ✅ Designed for red team operations and ephemeral access into restricted environments using Tailscale’s embedded client (tsnet). github.com/Yeeb1/SockTail

TrustedSec (@trustedsec) 's Twitter Profile Photo

Forget common backdoors — a DLL hijack in Windows Narrator can grant SYSTEM-level persistence at login. In our new blog, Oddvar Moe shows how attackers abuse accessibility features and what defenders should monitor. Read now! trustedsec.com/blog/hack-cess…

🕳 (@sekurlsa_pw) 's Twitter Profile Photo

PowerShell script to copy locked files. Has two modes: MFT (master file table) and Metadata (fsutil). Last one didn’t work on my payload VM but MFT mode did work.

PowerShell script to copy locked files. 

Has two modes: MFT (master file table)  and Metadata (fsutil). Last one didn’t work on my payload VM but MFT mode did work.
SpecterOps (@specterops) 's Twitter Profile Photo

AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 Jim Sykora went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ ghst.ly/3Lpmjzv

Melvin langvik (@flangvik) 's Twitter Profile Photo

I felt another MythicC2 demo and showcase was in order, showing off both the new Forge collection utility, but also my Apollo fork with HTTPx Malleable Profile support. Video is out now (link in comments)

I felt another MythicC2 demo and showcase was in order, showing off both the new Forge collection utility, but also my Apollo fork with HTTPx Malleable Profile support. Video is out now (link in comments)
Virus Bulletin (@virusbtn) 's Twitter Profile Photo

Bitdefender, with support from Georgian CERT, exposes Curly COMrades’ new tactic of deploying a tiny Alpine Linux VM via Hyper-V to run CurlyShell and CurlCat, securing persistence while bypassing standard EDR solutions. businessinsights.bitdefender.com/curly-comrades…

Bitdefender, with support from Georgian CERT, exposes Curly COMrades’ new tactic of deploying a tiny Alpine Linux VM via Hyper-V to run CurlyShell and CurlCat, securing persistence while bypassing standard EDR solutions. businessinsights.bitdefender.com/curly-comrades…
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Dynamic EDR Evasion. A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER). A great post by Matt Hand (Matt Hand). Source: medium.com/@matterpreter/… #redteam #blueteam #maldev #evasion

Dynamic EDR Evasion.

A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER).

A great post by Matt Hand (<a href="/matterpreter/">Matt Hand</a>).

Source: medium.com/@matterpreter/…

#redteam #blueteam #maldev #evasion
Horizon Secured (@horizon_secured) 's Twitter Profile Photo

🔒 Secure Bits 💡 Have you ever heard of 𝗘𝗦𝗖 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀? I guess you have. If you're running 𝗔𝗰𝘁𝗶𝘃𝗲 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗲 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 (𝗔𝗗 𝗖𝗦) and haven't audited it for ESC misconfigurations — you may be sitting on a

🔒 Secure Bits 💡
Have you ever heard of 𝗘𝗦𝗖 𝘃𝘂𝗹𝗻𝗲𝗿𝗮𝗯𝗶𝗹𝗶𝘁𝗶𝗲𝘀? I guess you have.

If you're running 𝗔𝗰𝘁𝗶𝘃𝗲 𝗗𝗶𝗿𝗲𝗰𝘁𝗼𝗿𝘆 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗰𝗮𝘁𝗲 𝗦𝗲𝗿𝘃𝗶𝗰𝗲𝘀 (𝗔𝗗 𝗖𝗦) and haven't audited it for ESC misconfigurations — you may be sitting on a