Outsmart, Outmaneuver, Redefine the Tactics
blog š https://t.co/jBrypEoM7c
learn š https://t.co/llylzGEs0Dmasterclass.redteamtacticsacademy.comJoined June 2023
Not gonna lie through the adversaryās lens, Confluence used to be my go to for intel after a foothold. But I slept on ServiceNow. Get familiar with all the tricks in there trust me, there are some real easter eggs that are game changers
Back in my pre-cybersecurity days, I reached out to EC-Council.
Itās 2025 now, and Iām convinced theyāve put me on a zero-day never ending call list
Anyone here used Torq? Just got access and exploring its potential. From a Red Team perspective, Iām curious how it might support operational workflows like helping surface interesting data or logs that could support R&D and improve offensive capabilities. Would love to hear howā¦
Someone in a meeting today seriously suggested, āWe should go with QRadar itās the best SIEM out there.ā
I didnāt argue. I just quietly dropped off the call like my spirit gave up before I could. š
A threat actor puppeteered an in-house red teamerās account and wrecked shop.
Blue team saw the chaos and said:
āOh, itās probably just the red team being spicy again.ā
They didnāt look closer.
š” Maybe donāt whitelist the wolf just because itās in a red hoodie.
š If yourā¦
Curious how effective do you really think honeypot user accounts are? Personally, Iāve had no problem spotting them, but Iām wondering what others think about their actual impact. Are they worth the effort?
Fam, not gonna lie starting to love Netskope š
Itās been giving me a hard time latelyā¦
RBI rendering my phishing pages like itās a YouTube stream
Overheard a heated debate:
One guy saw āMachine Learning Identified High-Confidence Malicious Fileā in the CrowdStrike dashboard after dropping a file to disk.
He goes, āDamn, this new AI is getting dangerous.ā
The other guy? āNot everything is AI this isnāt AI. Vendors just slapā¦
A lot of in-house red teamers Iāve spoken with mention burnout not from engagements, but from the pressure of feeling liable for recommendations.
The tough part? Writing them in a way that doesnāt make it seem like their words are gospel because teams fixing the issues often comeā¦
The EDR-that-shall-not-be-named set the meeting.
30 minutes in⦠still waiting.
If only their detection was as slow as their support. š
Funny how fast they were when it was time to demo to the execs.
Seen some orgs running split EDR setups like MDE on workstations, CrowdStrike on servers. Not layered, just segmented. From a red team perspective, does this actually make your job harder? Or does it just shift the approach? Curious what folks are seeing in the wild.
Whatās your honest take on Breach and Attack Simulation (BAS)?
Some swear by it. Others say itās just overpriced hype.
Some argue it surpasses Purple Teaming; others insist it has nothing to do with Purple Team exercises at all and fits better in other non technical or complianceā¦
honestly, this doesnāt need a retweet or praise not because itās not worthy, but because the work speaks so loudly for itself. just look at this course. look at the update. respect, respect, respect @_ZeroPointSec . heās so transparent he even lists the platforms heās using, soā¦
honestly, this doesnāt need a retweet or praise not because itās not worthy, but because the work speaks so loudly for itself. just look at this course. look at the update. respect, respect, respect @_ZeroPointSec . heās so transparent he even lists the platforms heās using, soā¦
Had a very interesting call with the one-that-shall-not-be-named (very famous EDR).
They basically said:
āYeah, weāre not too worried about downloads. Execution is what matters.ā
So⦠downloading malware is fine as long as you donāt run it?
Thatās like saying shoplifting is coolā¦
Today I wanna share something that really bothers me: these referral bonus programs at companies can seriously hurt fairness.
A close friend an absolute beast in red teaming (Iāve worked with him, I know) applied to a big enterprise software company. Crushed 4 rounds, last oneā¦
28 Followers 100 FollowingStill trying to get into cybersecurity but working helpdesk for the state. I love travel, gardening, and learning new things.
59 Followers 81 FollowingCutlet Maker is a meme token inspired by the legendary underground ATM malware Cutlet Maker ā the infamous tool that once made cash machines rain.
96K Followers 2K FollowingHacker, marketer. I manage socials and produce amazing technical blogs for cybersecurity orgs. Founder of @hacker_content and @haksecio
9K Followers 2K FollowingThreat Researcher | Co-Host of Atomics on a Friday | LOLDrivers & Atomic Red Team Maintainer | I'm Everywhere and Nowhere - BSG.
43K Followers 284 FollowingYapping about AI, AppSec, Hacking, & Cybersecurity ⢠Helped secure organizations like Google ⢠Opinions are my cat's ⢠Part-time shitposter
7K Followers 599 FollowingHacking neural networks so that we donāt get stuck in the matrix. Builder and Breaker. Opinions are my own. https://t.co/ij8buvMaXg
3K Followers 57 Followingā ANONYMOUS SERVERS WITH #Š”2 INFRASTRUCTURE ā CRYPT FILE SERVICE X #REDTEAM and FOUNDER of the SERVICE INJECT https://t.co/P0TXp5eL9D / https://t.co/K5bgCBd3NF
699K Followers 4K FollowingHost of The OPERATOR Podcast. SEAL Team Six. Two Silver Stars. Four Bronze Stars w/ Valor. NY Times Best-Selling Author. Speaker. Front Toward Enemy.
2K Followers 263 FollowingAdversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results
9K Followers 99 FollowingSharing resources from the cybersecurity community ⢠Passionate learner and creator ⢠YouTube: https://t.co/1BmE6QOd0D ⢠Turn ON Notifications š
355K Followers 594 FollowingHost of Politics/Culture/TrueCrime Pod The DebriefšļøLive on X, YouTube, Rumble, and Kick M-F at 5pm EST š„ Former DHS Special Agent šŗšø Links Below ā¬ļø
44K Followers 43 FollowingI work with visionaries to transform raw ideas into taste-driven narrative assets that shape culture. Strategic writing for cultural innovators.
30K Followers 1K Following3rd Gen Hacker | Fortune 150 Global Head of OffSec | BurbSec | OT\ICS | Seen on Fox, Wired, TechCrunch⦠| Infosecās Community Builder | I donāt read replies.
646 Followers 828 FollowingHacker & Lead of Internal Net Pen @ IBM X-Force Red. My opinions are my own. Member @ VX-underground. Instructor @ https://t.co/6djWnUzbJ0. ŃŠ»Š°Š²Š° ŃŠŗŃаине
12K Followers 4K FollowingStarted in ops&blue, now I hack for a living. SANS author/instructor in Oregon. Founder: https://t.co/c36tmCXDpt. He/him.
@[email protected]
No recent Favorites. New Favorites will appear here.