DragoQcc's profile picture. Adversary Simulation 
@SpecterOps

DragoQCC

@DragoQcc

Adversary Simulation @SpecterOps

Joined June 2015
Similar User
Octoberfest73's profile picture. Red Team | Offensive Tool Dev | Malware Dev | OSCP | OSEP

@Octoberfest73

MalDevAcademy's profile picture. A comprehensive module-based malware development course providing fundamental to advanced level knowledge

@MalDevAcademy

werdhaihai's profile picture. Adversary Simulation Consultant @SpecterOps

https://t.co/pztdK7udq3

@werdhaihai

kleiton0x7e's profile picture. A web security guy, Red Team Enthusiast and wannabe Malware Developer. Opinions and views are my own.

@kleiton0x7e

zyn3rgy's profile picture. Adversary Simulation @SpecterOps | Previously @Rapid7 & @Protiviti

@zyn3rgy

OtterHacker's profile picture. Professional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI

@OtterHacker

eversinc33's profile picture. I like computers :3 · https://t.co/Eiur8iOJQ4

@eversinc33

VirtualAllocEx's profile picture.

@VirtualAllocEx

Jonas_B_K's profile picture. Product Architect at SpecterOps

@Jonas_B_K

d1rkmtr's profile picture. Security researcher @AlteredSecurity

@d1rkmtr

waldoirc's profile picture. Trying to figure out how computers work.  Figuring out SDR, IOT, and Mobile exploitation.

https://t.co/rLZFU0dOBy

@waldoirc

C5pider's profile picture. timeless developer

@C5pider

0xBoku's profile picture. Adversary Services @ IBM X-Force Red

@0xBoku

LittleJoeTables's profile picture. Supreme Commander, Red Team @BishopFox
https://t.co/YcsVLOe1EL
https://t.co/z3UKx3VEBH

@LittleJoeTables

d_tranman's profile picture. salsa sultan, verde villain, condiment connoisseur
Adversary Services Intern @xforce
oscp crto crtl
ex:  @NationalCCDC+@wrccdc & @globalcptc @calpolyswift

@d_tranman

Pinned

github.com/DragoQCC/HardH… Today, I am releasing HardHat C2 on GitHub. HardHat is a multiplayer, cross-platform C2 developed in C# for adversary emulation and red teaming. I would like to give some thanks to my coworkers @SpecterOps and to @_RastaMouse for all their help.


DragoQCC Reposted

Oh man, when your POC ends up in LWiS even though it's dropped same day! You guys are doing amazing work @badsectorlabs blog.badsectorlabs.com


DragoQCC Reposted

New tool published which is proving to be useful. Cred1py allows execution of the CRED-1 SCCM attack published by @Raiona_ZA over SOCKS5 UDP by wrapping the awesome PxeThiefy.py from @0xcsandker Enjoy :) github.com/SpecterOps/cre…


DragoQCC Reposted

Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo CredMarshalTargetInfo trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of @cube0x0 krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)

decoder_it's tweet image. Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo  CredMarshalTargetInfo  trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of @cube0x0  krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)
decoder_it's tweet image. Is Kerberos relaying so limited? I'd say no, thanks to @tiraniddo  CredMarshalTargetInfo  trick. In this case, I'm relaying SMB to HTTP (ADCS) with a modified version of @cube0x0  krbrelay using DFSCoerce and PetitPotam - classic ESC8 attack with Kerberos, no DCOM involved ;)

Check out my recent blog post on the new incremental Dotnet source generators. It covers the basics of getting started, a breakdown of common Roslyn terminology, and logging issues as they come up. posts.specterops.io/dotnet-source-… #dotnet #SoftwareDevelopment #csharp


DragoQCC Reposted

Want to generate cleaner, more efficient code with Source Generators? @dragoqcc covers the essentials, how to solve common problems, and logging tips in our new blog post. Read more ⤵️ ghst.ly/3N6Vxth


DragoQCC Reposted

I wrote a blog post about some of the intangible benefits of working as a red team operator and adversary simulation consultant at SpecterOps. It's pretty awesome here. And we're hiring! posts.specterops.io/life-at-specte…


I recently released a Discriminated Union like result type library for .NET github.com/DragoQCC/Union… Some of its key features are - Set up to 16 different return types - Capture custom errors and exceptions - Safely invoke methods without try-catch #Dotnet #csharp #opensource


DragoQCC Reposted

Just wrapped up DEF CON Demo Labs and published Maestro, a new tool for lateral movement with Intune from C2. Thanks to everyone who came to check it out! I'll be posting a blog and wiki with more info soon, but here's the code and link to today's slides: github.com/Mayyhem/Maestro


DragoQCC Reposted

What's better than seeing Attack Paths from Active Directory to Azure and back down? Seeing them in dark mode. Check out the new release!

JustinKohler10's tweet image. What's better than seeing Attack Paths from Active Directory to Azure and back down?  

Seeing them in dark mode. Check out the new release!

Hybrid Attack Paths across AD & Azure now in BloodHound! 🙌 Along with this update, BloodHound v5.13.0 also includes view improvements & the long awaited Dark Mode! Check out our latest blog post from @JustinKohler10 to learn more about these features. ⬇️ ghst.ly/4ftbqY4



DragoQCC Reposted

I've published my draft open source C2 specification. github.com/rasta-mouse/OS… All comments and discussions welcome.


DragoQCC Reposted

My first talk finally landed on YouTube from @SpecterOps #socon24, looking forward to doing it again on a new topic (but can’t bring myself to watch it back 😂) youtu.be/SoTHxMrsXrs?si…


DragoQCC Reposted

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March. If you are interested in getting credentials from LSASS without accessing its memory, check it out! medium.com/specter-ops-po…


DragoQCC Reposted

List is complete😂 Thanks to all who joined live! I had a blast, and I hope you all did too🥳 Next week, same time, I'm apparently doing an EDR tier list... 🤡If u missed it, VOD is here: youtu.be/iYKItfBbPoY

Flangvik's tweet image. List is complete😂 Thanks to all who joined live! I had a blast, and I hope you all did too🥳 Next week, same time, I'm apparently doing an EDR tier list... 🤡If u missed it, VOD is here: youtu.be/iYKItfBbPoY

DragoQCC Reposted

I’ve used a lot of Adam’s work throughout the years, and now I actually get to work with him! So excited for him to join the team!

First con talk done. Was scarier than I thought, but in a good way! Looking forward to doing it again! Also excited that I’ll be joining @SpecterOps in April. This is a team that I’ve wanted to work with ever since the company started. I’ve used so many of their revolutionary…

_xpn_'s tweet image. First con talk done. Was scarier than I thought, but in a good way! Looking forward to doing it again! Also excited that I’ll be joining @SpecterOps in April. This is a team that I’ve wanted to work with ever since the company started. I’ve used so many of their revolutionary…


DragoQCC Reposted

Have you used a web shell on an offensive assessment recently? Were you able to task and create it through your C2 framework? I'm excited to announce the new Arachne agent for Mythic that allows you to do just that! Check it out posts.specterops.io/spinning-webs-…


DragoQCC Reposted

I fixed some things in SharpSCCM. On @_RastaMouse 's suggestion, it's using dnMerge and the exe is ~1MB now. Still working on getting it under the beacon default task size. Code also reflects the correct SCCM site system roles now, so -mp option is now -sms in a lot of cases🧵


The HardHat Toolbox is finally ready github.com/HardHatToolbox. It contains Rivet, a demo Asset (Implant) written in Rust, along with the Asset Development repo, which contains detailed step-by-step guides and templates to help get you started on writing custom Assets for HardHat.


Alpha 0.3 of HardHat C2 is out, another giant update with around 16k additions & 6k deletions. Includes a ton of bug fixes and new features. Check out the full changelog here docs.hardhat-c2.net/changelog/alph… and try it out here github.com/DragoQCC/HardH…


DragoQCC Reposted

💡 WHAT IS PURPLE TEAMING AT SPECTEROPS? SpecterOps recently introduced our Purple Team service offering, but what is it? We define it as "the evaluation of security control efficacy through atomic testing using deliberately selected test cases." ghst.ly/3EUVRHB


DragoQCC Reposted

Get an introduction to the HardHat C2 framework. Check out @DragoQcc's #BHUSA booth presentation. ➡️ ghst.ly/3Q3UTy3 Get HardHat today: github.com/DragoQCC/HardH…


Loading...

Something went wrong.


Something went wrong.