AvePoint has fixed a vulnerability in DocAve, Perimeter and Compliance Guardian discovered by our researchers @m1ntko and @Calvaruga.
This vulnerability can be used to achieve Remote Code Execution (RCE) in affected systems.
➡️ Advisory: avepoint.com/company/docave…
Neo4LDAP - a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to BloodHound github.com/Krypteria/Neo4…
I've just released Eclipse, a PoC of what I call Activation Context Hijack. This technique redirects any application to load an arbitray DLL, allowing to inject code into any trusted process. More info available on Github. github.com/Kudaes/Eclipse
⚔️ ¿Sabías que los servicios de Threat Hunting e Incident Response son esenciales a la hora de detectar y responder ante amenazas? José Lancharro, director de @BlackArrowSec, va a impartir un taller sobre cómo neutralizar las amenazas.
✍🏼 Inscríbete: events.teams.microsoft.com/event/56eb5a3d…
I created a tool designed to simplify the generation of proxy DLLs (i know, a bit late to the game) while addressing common conflicts related to windows.h when it comes to redefining an existing function when performing proxy DLL. It was a fun project 😁
github.com/Krypteria/Prox…
¡No parpadees si no te lo quieres perder! Kurosh Dabbagh nos habla de "Call Stack Spoofing para ocultar la ejecución de implantes desde memoria" #WindowsInternals#Malware#EDR@_Kudaes_
3K Followers 2K Following● Senior Red Team Cybersecurity Expert ● Ex-CTO @ Cyberguard
● SysAdmin +10 years ● Creator of AutoRDPwn: The Shadow Attack Framework
85 Followers 358 FollowingAdvanced script kiddie who digs on true hacking methodologies. I also like cats with evaporation power.
Bsky: https://t.co/tRA05htE7Q
73 Followers 472 FollowingBrindamos soluciones innovadoras para tus necesidades de ciberseguridad.
Tranquilidad para centrarte en lo de que de verdad importa.
85 Followers 358 FollowingAdvanced script kiddie who digs on true hacking methodologies. I also like cats with evaporation power.
Bsky: https://t.co/tRA05htE7Q
3K Followers 124 Followingcybersecurity enthusiast, author. speaker, mathematician. Love my wife and kids. Author of MD MZ, MalWild and Maldev for Ethical Hackers (2022-2024) books.
77K Followers 765 FollowingEnd-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet
Blogs, news, webinars, and tools!
20K Followers 2K FollowingTechnical account for global cyber security & resilience provider, NCC Group. This account is run alongside the @NCCGroupplc corporate account.
28K Followers 206 FollowingHacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
65K Followers 2 FollowingThis is an unofficial HackerOne public disclosure watcher who keeps you up to date about the recently disclosed bugs. By @NOBBD
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
195K Followers 14K FollowingWe help professionals acquire the skills, knowledge and certificates by teaching defense through offense to advance their careers in cybersecurity.
20K Followers 439 FollowingHacker, Infosec Researcher, Military Affairs & History, PowerShell, AD and Azure pwner, Creator of Nishang and others :)
Founder @alteredsecurity