Peace and love to my information security colleagues
But GOD DAMN, do ALL of you need to make a fucking course? How many courses do we actually need?
Dawg, I see so many of you trying to sell your courses. You can't do ANYTHING else other than prey on the noobs? Holy cannoli
Dear Red Team nerds,
If you're curious what a successful and serious malware campaign looks like (if you want to make a more serious Red Team engagement) I HIGHLY suggest reading the write up on the new malware campaign called TransferLoader
zscaler.com/blogs/security…
So you've compromised a host that isn’t cloud-joined. Antero Guy breaks down how to request OAuth tokens & enumerate an Entra ID tenant by using an SSO cookie from a non cloud-joined device. Read more ⬇️ ghst.ly/445tQKL
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷♂️
Read Here - akamai.com/blog/security-…
MCP Server
🔥Compatible with Burp Suite Community and Professional
🔗Link Burp Suite to your AI clients with the Model Context Protocol
portswigger.net/bappstore/9952…
tables.blurbdust.pw/netntlmv1-rain…
It might be a bit rocky for the next couple days as I work out a couple issues with magnet links and the self-hosted tracker but its up and working
Temu, AliExpress, SHEIN, etc prices are going up starting this week! New EO just dropped, & inside is a revocation of De Minimus for China imports.
“De Minimus” allows imports under $800 to skip filing customs paperwork & paying taxes/duties.
Every US business had to do this…
NEW BLOG: AiTM/ MFA phishing attacks in combination with “new” Microsoft protections (2025 edition)
After the successful 2023 and 2024 edition, created the blog based on the latest protections and innovations against AiTM attacks
#MicrosoftSecurityjeffreyappel.nl/aitm-mfa-phish…
Wrote a short blog post on:
- ETW Threat Intelligence generated by SetThreadContext (hardware breakpoints)
- Kernel debugging and reversing
- Setting HWBPs in a more "stealthy" manner (not the same ETW TI events generated - no detections)
Check it out praetorian.com/blog/etw-threa…
This is the kind of issue where you need to change your perspective. If you are stuck with "we as the attacker want to directly access cached data", you will miss the obvious.
Turns out, we can control the cache parameter, by forcing the victim to visit the link with our value!!
This is a reminder to everyone that your malware payload does not need to be ultra-1337 for it to be effective or evasive.
In a bit of irony, the more sophisticated you try to make your malware be, more the IOCs you're introducing into your code base.
The goal is to write…
New blog from me on using CLR customizations to improve the OPSEC of your .NET execution harness. This includes a novel AMSI bypass that I identified in 2023. By taking control of CLR assembly loads, we can load assemblies from memory with no AMSI scan. securityintelligence.com/x-force/being-…
2K Followers 3K FollowingTailored cybersecurity upskilling platform for all levels, catering to beginners and pros | Best way to boost your #cybersecurity skills
2K Followers 833 FollowingSecurity Stuff @ Microsoft || Red Team Operator || Founder @ https://t.co/skjEVTiYF8 || BB/SRT @ Synack Red Team || Opinions and tweets are my own
287 Followers 645 FollowingAttempting to commit awesome in the infosec space by day, while sipping fancy tequila by night 🕶️💻🍹 #CyberNinja #TequilaEnthusiast
561 Followers 2K FollowingWe are an up and coming Progressive Metal band from Clifton NJ. Check out our new single, “Tendencies”! Follow us to keep updated on new music!
434 Followers 34 FollowingWe are a small band of engineers that work intimately with our clients to develop risk-based approaches to improve the overall security of their business.
26K Followers 247 FollowingCEO @ Astera | born lucky
anon feedback: https://t.co/9RtcgMyTHP | https://t.co/buKUN4hYly
I write about agency and related topics via Useful Fictions on S*bst*ck
40K Followers 326 FollowingI built a C library that lets you compile 12kb static binaries that run natively on Linux, Mac, Windows, FreeBSD, OpenBSD, NetBSD and BIOS using just GCC/Clang.
986 Followers 26 FollowingA new DC hacker conference: Bringing together builders, breakers, and fixers to do cool shit. 🪩 Year 1: January 24-25, 2026 🪩
https://t.co/qYKu4hl0Uj
7K Followers 47 FollowingCapture the Flag Team from UC Santa Barbara's SECLAB and Arizona State University's SEFCOM. DARPA Cyber Grand Challenge 3rd Place. Phrack author. Let's hack!
2K Followers 2K FollowingOur industry-leading platform is the most effective solution for learning modern binary exploitation through a world-class curriculum developed by @RET2Systems
35K Followers 255 FollowingWe help secure the world’s most targeted organizations and products. We combine security research with an attacker mentality to reduce risk and fortify code.
13K Followers 508 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu