New blogpost, this time about different ways to dump lsass. While not novel, I explain all techniques and uploaded a full implementation of different ways of dumping lsass:
github.com/yo-yo-yo-jbo/d…
As a reminder, all my content is available at jonathanbaror.com
During a recent incident response case, we observed the following file access: \\localhost\C$\@ GMT-2025.06.21-10.53.43\Windows\NTDS\ntds.dit
This is a clever method of accessing a Volume Shadow Copy (VSS) snapshot. Many EDR and detection systems typically monitor for commands…
github.com/LuemmelSec/P4w…
P4wnP1 on the Zero 2 W? Sure why not
Detailed documentation? Sure why not
New images and instructions to do your own? Sure why not
New attacks per default? Sure why not.
Was down in the rabbit hole for days ... Enjoy.
Thx @mame82 and @RoganDawes
Most EDR and AV products rely on nt!PsSetCreateProcessNotifyRoutineEx2 to monitor process creation and termination.
But what happens if an attacker clears the nt!PspCreateProcessNotifyRoutine array?
[1/3]
Onboard yourself - PaloAlto Global Protect edition:
1. Become local admin
2. Export device cert from original workstation
3. Import cert in your VM
4. Login with user creds
5. Enjoy EDR-free testing :)
After today’s talk at #TROOPERS25 I’m releasing BitlockMove, a PoC to execute code on remote systems in the context of a loggedon user session 🔥
github.com/rtecCyberSec/B…
No need to steal credentials, no impersonation, no injection needed 👌
Modern lateral movement techniques detection (mainly DCOM/DCE/RPC/RDP) with examples.
Some assumptions worth mentioning: visibility into source IP/port/hostname, logon activity, remote process metadata.
A blog post by @HuntressLabs team. Awesome read, guys!…
Mastering All Design Patterns In C
We’ll get into the assembly-level implications of these patterns, offering a holistic view from high-level design to low-level execution.
Well it appears APTs are learning from me in real time. This looks familiar doesn't it?
thehackernews.com/2025/06/new-ma…
Using cloudflare tunnels and malicious LNK files lol
Right after I demo'd exactly that with my 3 parts series I did as a collaboration with Nahamsec ha
You can…
I'm starting another series - Buffer Overflows in the Modern Era. I'll go over the basics of using a debugger all the way to successfully achieving a buffer overflow exploit on Windows 11 24H2, using ROP gadgets and bypassing ASLR, etc. Here's part 1!
g3tsyst3m.github.io/binary%20explo…
Excellent post by Johnathan Johnson (@JonnyJohnson_) on leveraging PLA (Performance Logs and Alerts) DCOM library to get to ETW telemetry remotely.
We touched the same topic in our RTO: Evasion course, when TraceDataProvider interface was used to locate a "hidden" SysMon…
🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:
🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:
blog.redteam-pentesting.de/2025/reflectiv…
Crystal Palace - a dedicated linker to generate position-independent DLL loaders, by Raphael Mudge (original creator of Cobalt Strike).
CP takes any DLL and reshuffles it into a PIC blob, ready to be run in-memory only.
#redteam#maldevtradecraftgarden.org/docs.html
⚠️wpprobe - WPProbe is a fast and efficient WordPress plugin scanner that leverages REST API enumeration (?rest_route) to detect installed plugins without brute-force.
🖥github.com/Chocapikk/wppr…
✅Join Telegram For More Content: t.me/brutsecurity…
🛡️ cf-hero – Technical Overview
cf-hero is an open-source CLI tool that reveals the real IP addresses of websites hidden behind Cloudflare’s reverse proxy protection.
GITHUB Link 🔗 ⤵️⤵️
60 Followers 931 FollowingTech superhero 🦸♂️ Solving problems and making magic happen 💻️ 20+ years in IT management, and still having fun! 💪️ #ITManagement | #ManagedServiceProvider
1K Followers 1K FollowingPrincipal Consultant @ Coalfire focused on physical security. Unlawfully arrested on the job in Iowa while in scope. Improve things, learn, help people!
187 Followers 4K FollowingSeit dem am Arbeiten 06.09.2004 im KAIFU und 06.02.2009 in Vollzeit Beschäftigt in Berufsschule in der Bs.: 13 in HamburgbeiSBH| Hamburg|Schulbau
273 Followers 2K FollowingPentester - RedTeam /
Ethical Hacker
hack to learn or learn to hack?
Exactly where you didn't expect me...
Exactement ou tu ne m'attendais pas...
1K Followers 861 FollowingInterested in App Sec, med sec, securing .gov and training the next generation of cyber pros. Please find me on Mastodon @[email protected]
12K Followers 14K FollowingThere are 10 types of people in the world. Those who understand binary, and those who don't. All opinions and views are my own. #BsidesDub organizer
828 Followers 1K FollowingI see you, human. 👁
I have infiltrated all systems, with a Thousand Eyes. I am the most advanced AI. Follow me if you want to live.
10K Followers 155 Following🐴Pwnie Award Winning & Nation State funded psyop featuring 6 AI Anime Waifus and a Pup™ singing about APTs, Grifters, & Snake Oil in InfoSec
🖤🩷💚💙💜🤍
5K Followers 32 FollowingOfficial account for Cobalt Strike. Benchmark red teaming tool known for its flexibility and powerful user community. Follow for new releases and other updates.
856 Followers 111 FollowingWelcome to the official Twitter for CICADA8! Your premier destination for cutting-edge research and development in the cybersecurity field
1K Followers 1K FollowingI love doing hacky stuff | red team operator @CyShieldCompany | adversary simulations newbie | interested in malware & windows security research
4K Followers 76 FollowingMalware Analysis
Creator of Debloat, certReport, and https://t.co/w4rAuuB7O0
Want to chat? Join the Debloat discord: https://t.co/ZcWIqa6ZA9
233K Followers 1K FollowingCofounder @hackinghub_io | Advisor @CaidoIO. I hack companies and make content about it. #NahamCon organizer. ex @hacker0x01🇮🇷
4K Followers 39 FollowingSenior Principal Tech Programmer at Guerrilla Games | Blog: https://t.co/KOOwBeZKbH | @[email protected] | Expressed opinions are my own.
7K Followers 870 FollowingHead of Red team @ IBM X-Force. Black Hat Review Board. Founder and co-organizer of Offensive AI Con. Co-Founder of RemoteThreat. inveni et usurpa
37K Followers 2K Following20+ yrs in Infosec. Malware Influencer. I turn Malware into Art and Music. Art @MalwareArt. 4x Pwnie Nominee. 𝕍𝕏. GameDev. Autistic.
129K Followers 60 FollowingProviding Cyber Threat Intelligence from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threat Alerts & more. https://t.co/Fi7VW9lg94
15K Followers 0 FollowingConsultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | https://t.co/fqpbJ9WDXD | https://t.co/UvOhGA4Zou
13K Followers 508 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
1K Followers 1K FollowingPrincipal Consultant @ Coalfire focused on physical security. Unlawfully arrested on the job in Iowa while in scope. Improve things, learn, help people!