Best Citrix Breakout ever. You can only download .ica files that provide access to certain local applications but breakout out of these applications is not possible? Just modify the .ica file before starting it and remove The InitialProgram= value -> Full Citrix Session! 🤓
The second book in my “being a professional red teamer requires more than just having kick ass technical tradecraft” series is: “Never Split the Difference” by Chris Voss.
The reason I picked this book is because red teams rarely control the environments they are operating in.…
The first book in my “being a professional red teamer requires more than just having kick ass technical tradecraft” series is: “Thanks for the Feedback” by Douglas Stone & Sheila Heen.
The reason I recommend this book is simple: red teamers spend _a lot_ of time delivering…
I stopped reporting Internet-exposed Citrix Netscaler instances as a vulnerability because dozens of customers argued with me that “it is intended to be exposed directly to the Internet”. I was right all along and will start reporting it again starting today.
I stopped reporting Internet-exposed Citrix Netscaler instances as a vulnerability because dozens of customers argued with me that “it is intended to be exposed directly to the Internet”. I was right all along and will start reporting it again starting today.
“Once you start a Windows machine, it will first attempt to obtain network configuration via DHCPv6 […] due to Windows’ preference for IPv6. […] even if your network does not actively use IPv6.”
This makes poisoning using mitm6 especially dangerous:
resecurity.com/blog/article/m…
Feeling too familiar with using Sysmon? You can use it for #redteam purposes by having it overwrite the #antimalware executable. Just like I did with #windowsdefender
I just started a new blog, and this is my first post. I took a bit of PTO, so this is a little record of some fun I had playing around with Intune during that time. It's about enrollment restriction bypass😄
temp43487580.github.io/intune/bypass-…
#malware
"clipup.exe" in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam#BlueTeam
We're back - returning to the scene of the "crime" - to demonstrate 2 pre-auth RCE chains against Commvault (CVE-2025-57788, CVE-2025-57789, CVE-2025-57790, CVE-2025-57791)
Enjoy, and speak soon 😉
labs.watchtowr.com/guess-who-woul…
Something neat!
Turns out, if an IP address has a 0 in one of its octets (like 10.20.0.2), you can omit the zero and still reach the same host!
So 10.20.2 works the same as 10.20.0.2
Windows Defender blocks any procdump execution referencing "lsass" on the command line (1️⃣)
Simply querying lsass' process ID and using this instead bypasses this somewhat naive detection (2️⃣)
Even simpler? Use lsass' service name, "KeyIso" 🤷 (3️⃣)
Thanks to everyone who joined my DEFCON33 talk!🎉
For those of you who missed it and are interested in seeing how we can extract cleartext credentials and bypass MFA directly from the official Microsoft login page, I just uploaded the recording to YouTube:
youtu.be/z6GJqrkL0S0
I stumbled upon this tweet and dug a bit deeper into the internals of ksetup.exe: pentest.party/posts/2025/kse…
When you are local admin and need machine account credentials this could be a viable alternative to the good old LSA dump.
I stumbled upon this tweet and dug a bit deeper into the internals of ksetup.exe: pentest.party/posts/2025/kse…
When you are local admin and need machine account credentials this could be a viable alternative to the good old LSA dump.
14K Followers 1K FollowingTeam @hashcat! Eternal n00b and knowledge seeker! Age is just a number and motivation is the fuel!
Whatever you do in your life, do not forget to be humble.
5 Followers 172 FollowingRecruiting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/k37v4g7kfW
13K Followers 492 FollowingWe're determined to make the world a safer place through our-industry recognized managed security services.
Founded by @HackingDave|Sister company @TrustedSec
88K Followers 73 FollowingHi! I'm Dave Plummer. You might remember me from such Windows components as Task Manager, Windows Pinball, Calc, ZIPFolders, Product Activation, etc. Cheers!
101K Followers 145 FollowingA portable multi-tool device in a toy-like body for pentesters and hardware geeks. Buy worldwide here ➡️ https://t.co/n09EKVnqri
2K Followers 657 FollowingCybersec/AI expert | Hacker | Pilot | OSCE3, CISSP, CCNP, CSIE | Better than a thousand hollow words is one word that brings peace | meme magic 🐸
108K Followers 2 FollowingMonitor your external network, search the Internet of Things and perform empirical market research. You can also find us on https://t.co/nPLFbFy8R5
2K Followers 1K FollowingYesterday is history. Tomorrow is a mystery.
Cloud Solutions Engineer at Contoso. Hacktive Directory admin.
Posts don't represent my employer(s).
10K Followers 1K FollowingPenetration Testing, Purple Team, Red Team & Adversary Emulation, Security Posture Review and Training
Let our Offense, Prepare your Defense.
#weareoffensive
2K Followers 2K FollowingCISO and faculty by day, adversary emulation/tools by night, bad jokes and memes all the time.
Profile photo image credit to Tib3rius.
My dog disapproves.
25K Followers 26K FollowingA Hacker who is A Lover of People, and Life @RetroTwinz @Secbsd, @GrumpyHackers, @NovaHackers, @deadpixelsec @hacknotcrime Advocate @PositivelyBlue_ OSCP, OSWP
14K Followers 1K FollowingTeam @hashcat! Eternal n00b and knowledge seeker! Age is just a number and motivation is the fuel!
Whatever you do in your life, do not forget to be humble.
No recent Favorites. New Favorites will appear here.