ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
ILS DOIVENT TOUS PARTIR.
BAYROU, RETAILLEAU, DARMANIN, NUÑEZ, BORNE, BERGÉ, BARROT, MACRON, TOUS !
👀Turns out MS-EVEN can do a lot more than NULL auth:
In addition to leaking environment variables, it is possible to coerce authentication from arbitrary logged on users* 🤯
*If you are willing to trigger Windows Defender.
Reading astrophysics books I saw the following quote from Isaac Asimov:
The most important sentence in sciences, the one that announces new discoveries isn't Eurêka but "that's funny..." that's the hacking spirit 🤌🏼
Thanks to everyone who joined my DEFCON33 talk!🎉
For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:
youtu.be/z6GJqrkL0S0
gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP…
It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.
hashcat v7.0.0 released!
After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had.
Detailed writeup is available here: hashcat.net/forum/thread-1…
Last month I spent hours implementing Channel Binding for MSSQLClient on Impacket. If you are interested in how CBT is computed, handling STARTTLS in python, TLS introspection on Windows or simply MSSQL databases check it out sensepost.com/blog/2025/a-jo… :)
Reverse engineering Microsoft’s SQLCMD.exe to implement Channel Binding support for MSSQL into Impacket’s mssqlclient.py. Storytime from Aurelien (@Defte_), including instructions for reproducing the test environment yourself.
(link below)
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
3K Followers 389 FollowingRed Teamer & Security researcher
Maintainer of #NetExec, #DonPAPI, dploot, certsync, and all the stuff on my github repo
bsky: https://t.co/zISpgvDSWc
0 Followers 64 Following🇫🇷 French
✏️ Aspiring penetration tester (Currently looking for a Penetration Tester position in Toulouse). CTF Player
🎹 Plays piano, drums and composes
80 Followers 2K FollowingTrust in His plan | God's love makes even the hardest journeys worthwhile | His love is the compass guiding your life's purpose |
3K Followers 6K FollowingHumanist technologist and AI optimist. Currently CTO at @welcomeaccount_. Building for an inclusive economy through #AI, #MachineLearning, and #Tech4Good
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
20K Followers 271 FollowingOffensive security company. Dojo of many ninjas. Red teaming, reverse engineering, vuln research, dev of security tools and incident response.
62K Followers 286 FollowingA kiwi coding mimikatz & kekeo
github: https://t.co/eS3LVgU6i0
Head of security services @banquedefrance
Tweets are my own and not the views of my employer
54K Followers 802 FollowingMédia d'investigation indépendant. Financez les documentaires que toutes les chaînes refusent de lancer !
Soutenir ➡️ https://t.co/FRGPbEe7Ni
10K Followers 0 FollowingAssetnote combines advanced reconnaissance and high-signal continuous security analysis to help enterprises gain insight and control of their evolving exposure.