gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP…
It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.
Building off of @CodyBurkard's prior work, I put together a tool for automating the decryption of Entra ID application tokens from Azure App Services resources.
Here's a blog that outlines the tooling:
netspi.com/blog/technical…
🚨 Hackers & Bug Hunters!
By combining Katana, LinkFinder, Arjun, and Burp Suite, I uncovered hidden API endpoints — including ones under /dev/ — and exploited:
✅ Mass Assignment
✅ API Excessive Data Exposure
✅ IDOR (Insecure Direct Object Reference)
These tools are gold when…
I have been presenting the risk to Active Directory if VMware infrastructure isn't well protected since 2015.
adsecurity.org/wp-content/upl…
VMWare admins can access the storage associated with virtual Domain Controllers and therefore have access to the AD database file (ntds.dit).…
I have been presenting the risk to Active Directory if VMware infrastructure isn't well protected since 2015.
adsecurity.org/wp-content/upl…
VMWare admins can access the storage associated with virtual Domain Controllers and therefore have access to the AD database file (ntds.dit).… https://t.co/upHm088O45
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿
(including past clipboard items)
inversecos.com/2022/05/how-to…
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿
(including past clipboard items)
inversecos.com/2022/05/how-to… https://t.co/H6zfZDd7J0
Most people miss this..
Hidden parameters are gold mines in web hacking.
They aren't visible. They aren’t linked.
And that’s exactly why they’re valuable.
Let’s explore how to hunt them-manually, smartly, and effectively.
👇 A practical recon guide to finding what others ignore.
How to find the Entra ID sync server - A new NetExec module🔎
Inspired by the great Entra ID talks at #Troopers25, I looked into how to find the Entra ID sync server.
Results: The description of the MSOL account, as well as the ADSyncMSA service account reference this server🚀
here we go! hope this helps every beginner trying to master the full recon to exploitation process. i’ve covered every step in detail and will be adding more soon..just a bit caught up with things right now.
infosecwriteups.com/recon-to-maste…
🚨Alert🚨 CVE-2025-49493:Akamai CloudTest Allows File Inclusion via XML External Entity (XXE) injection.
🧐Deep Dive from @Xbow : xbow.com/blog/xbow-akam…
🔥PoC : github.com/MuhammadWaseem…
📊316 Services are found on the hunter.how yearly.
🔗Hunter… https://t.co/CGEEZjThn8
12K Followers 11K FollowingData Privacy Is Everyone's Fundamental Right - AdFighter is free blocking software program for annoying advertisement, intrusive content, online trackers etc.
152 Followers 5K FollowingI specialize in digital marketing and growth hacking. I have experience working in a wide range of industries, from small businesses to large corporations 📊
3.8M Followers 369 Following纽约时报中文网官方推特。Official Twitter Account of The New York Times Chinese Website.
iPhone & iPad app: https://t.co/hzbwaOOxA6
Android app: https://t.co/NIusFpRU2S
765 Followers 705 FollowingAdvance-sec platform: is one of the top leaders in research and acquisition of vulnerabilities and 0day exploits.
Email: [email protected]
Wire: @advance_sec
284K Followers 71 FollowingPart of @CISAgov, we respond to major incidents, analyze threats, and exchange critical cybersecurity information with partners around the world.
10K Followers 6 FollowingBringing AI to offensive security by autonomously finding and exploiting web vulnerabilities. Watch XBOW hack things: https://t.co/D5Mco1u8zM
4K Followers 10 FollowingReal-time threat and infostealer intelligence for MSSPs, enterprises, and researchers. Detect leaks, monitor takeovers and respond instantly.
688 Followers 382 FollowingSearchlight Cyber creates products to enhance investigations, protect businesses, and combat cybercrime. Request a trial at https://t.co/zDISBtLIcU
5K Followers 949 FollowingVP of Research - @netspi Co-author of “Penetration Testing Azure for Ethical Hackers” (https://t.co/R8AjWWbSyj). @kfosaaen on most other platforms
247K Followers 3K FollowingPentester, Forensic investigator, and former college professor. Trained hackers at every branch of US military and intelligence.
Visit me at https://t.co/G478wufszw
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
7K Followers 235 FollowingProvide comprehensive visibility into internet-facing assets.
Looking for vulnerabilities and misconfigurations 24/7 since 2020.
https://t.co/MEjkffN1xg
28K Followers 206 FollowingHacker at @OutsiderSec. Researches AD and Azure (AD) security. Likes to play around with Python and write tools that make work easier.
20K Followers 2K FollowingPrincipal Identity Security Researcher at Microsoft. Ex-Secureworks. (MSc, MEng, PhD, CITP, CCSK).
And yes, opinions are my own ;)