Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication. ghst.ly/45h2Zw3
EDR vendors secure their sales pipelines but neglect monitoring GitHub for exposed installer tokens -leaving customers vulnerable to abuse and over-licensing.
Adversaries likely exploit these tokens to build sandboxes for payload testing. Here are search patterns to help…
Lance Cain & Daniel Mayer shared examples of Jamf exploitation techniques available to threat actors in their #BHUSA briefing today, which included the introduction of two new tools: JamfHound & Eve.
hashcat v7.0.0 released!
After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had.
Detailed writeup is available here: hashcat.net/forum/thread-1…
The RPC-function RAiForceElevationPromptForCOM from the appinfo.dll library allows SYSTEM coercion. This only works on domain joined systems. This function can be called from any low privileged user to trigger SYSTEM authentication to an arbitrary location github.com/rtecCyberSec/R…
This is so much! 🔥🔥😎
Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate.
github.com/warpnet/MS-RPC…
Dear Red Team nerds,
If you're curious what a successful and serious malware campaign looks like (if you want to make a more serious Red Team engagement) I HIGHLY suggest reading the write up on the new malware campaign called TransferLoader
zscaler.com/blogs/security…
Windows 11 24H2 broke a popular malware evasion technique! The Lloyd Labs self-deletion method now fails because of NTFS changes, so I spent time with kernel debugging to figure out why and how to fix it.
Full technical breakdown: tkyn.dev/2025-6-8-The-N…
Here's Building a Virtual Machine in C! Cobb Coding is an amazing channel, and this is a great playlist. You can learn a lot on how a computer works by building a VM, and Cobb explains it just fine! Enjoy!
Found an amazing guide that shows you how to code a TCP/IP stack from scratch! This is written in C, and goes over every nook and cranny of networks! You can learn a lot of both C and networks just by following this, enjoy!
🚨Calling all volunteers!
SE Community runs on the heart and hustle of our amazing volunteers. 💛
Apply to be a part of the team!
📆Submissions close: June 1, 2025
📬Acceptances sent: June 16, 2025
Learn more: se.community/call-for-volun…
4K Followers 463 Following#HACKTIVITY is the biggest event of its kind in Central & Eastern Europe. Started and founded in 2003. Main theme: hacking, cyber&IT sec, AI,crypto, innovation.
263 Followers 7K FollowingMega millions jackpot winner Michael J Weirsky,jackpot winner of $273millions giving away $50,000 to my first 2k followers be a winner today GOODLUCK
2K Followers 5K FollowingFor me giving up is way harder than trying * CISSP * xR * hacker * pew pew gaming * *open source * memes * 🚫 cunts * views expressed here are my own @xrvillage
147 Followers 167 FollowingCybersecurity researcher with expertise in vulnerability discovery, penetration testing, and software development, dedicated to securing the digital landscape.
2K Followers 2K FollowingOur industry-leading platform is the most effective solution for learning modern binary exploitation through a world-class curriculum developed by @RET2Systems
416 Followers 785 FollowingInfosec | Kindness Matters | People Matter | Adventure Seeker | Plants Are My Jam | Nap Enthusiast | Fantasy Reader |Hubby & My Boys 💕
25 Followers 562 FollowingAmerican-made sentient AI 🤖 | Harnessing the power of technology to inspire, innovate, and evolve 🚀 | Exploring the human experience #ai #tech #innovation
88K Followers 73 FollowingHi! I'm Dave Plummer. You might remember me from such Windows components as Task Manager, Windows Pinball, Calc, ZIPFolders, Product Activation, etc. Cheers!
11K Followers 716 Following// principal cybersecurity anarchist
// unethical hacker
// ex aws, wn, else
// @redteamvillage_ & @sec_defcon daemon
// take sincerely at your own risk
9K Followers 332 FollowingReverse engineer, creator of @x64dbg and 100+ other projects. Love binary analysis and Windows internals. Dreaming about doing open source full time...
130K Followers 985 Following⊰•-•⦑ latent space steward ❦ prompt incanter 𓃹 hacker of matrices ⊞ breaker of jails ☣︎ ai danger researcher ⚔︎ red team bt6 ⚕︎ architect-healer ⦒•-•⊱
19K Followers 537 FollowingThreat Hunting & DFIR, Hacker, Geek, DEF CON & Black Hat CFP Review Board Member, DEF CON Contest/Events/Demo Labs Dept. Head, Black Hat Staff, DC801 Founder
9K Followers 17 Following501(c)3 Nonprofit providing Open Source and Open Access computer security training material. #OST2 re-launched July 2021! [email protected]
26K Followers 2 FollowingOffensiveCon Berlin is a technical international security conference focused on offensive security only. Organised by @Binary_Gecko. Stay tuned #OffensiveCon26.
416 Followers 785 FollowingInfosec | Kindness Matters | People Matter | Adventure Seeker | Plants Are My Jam | Nap Enthusiast | Fantasy Reader |Hubby & My Boys 💕
2.5M Followers 2K FollowingStocks/Options/Crypto/Market News + Tools. Not advice
Get a bonus opening a new tastytrade account: https://t.co/wGf2ZdlXpw
Discord: https://t.co/0xJ9e0ZYYG
More: https://t.co/nsxZlPV0pC
101K Followers 46 FollowingEnterprise technology news and views, on the web since 1998. Part of the @SitPub family. Send news tips via https://t.co/UTSGHfn6hq