@Tw1sm Profile picture

Matt Creel

@Tw1sm

Adversary Simulation @ SpecterOps | OSCP | CRTO | https://t.co/LfiIqD4M4l

Similar User
Octoberfest7 photo

@Octoberfest73

Filip Dragovic photo

@filip_dragovic

Charlie Clark photo

@exploitph

Daniel F. photo

@VirtualAllocEx

Bobby Cooke photo

@0xBoku

LuemmelSec photo

@theluemmel

mgeeky | Mariusz Banach photo

@mariuszbit

klez photo

@KlezVirus

an0n photo

@an0n_r0

eversinc33 🤍🔪⋆。˚ ⋆ photo

@eversinc33

Matt Eidelberg photo

@Tyl0us

BlackWasp photo

@BlWasp_

topotam photo

@topotam77

ed photo

@sprocket_ed

Austin Hudson photo

@ilove2pwn_

Matt Creel Reposted

I’ve always thought Seatbelt was a great situational awareness tool, I created a python implementation of it. Due to the nature of how I expect it to run, it only implements the remote modules, but I hope someone finds it useful. github.com/0xthirteen/Car…


Matt Creel Reposted

Want to move laterally from C2 on an Intune admin's workstation to any Intune-enrolled device? Check out Maestro (github.com/Mayyhem/Maestro), a new(ish) tool I wrote for those situations, and this blog post to walk you through how: posts.specterops.io/maestro-9ed71d…


Matt Creel Reposted

Looking around I hadn’t seen any python tools to interact with the registry that doesn’t use remote registry. So I made one that implements all StdRegProv methods github.com/0xthirteen/reg…


Matt Creel Reposted

It's alive! Apeman is a graph-based tool to model AWS IAM permissions. This marks the start of a new journey to methodically identify and remediate IAM attack paths, and I look forward to learning together with y'all. github.com/hotnops/apeman


Matt Creel Reposted

[Tool & Blog release] - smbtakeover, a technique to unbind/rebind port 445 without loading a driver, loading a module into LSASS, or rebooting the target machine. The goal is to ease exploitation of targeted NTLM relay primitives while operating over C2. Github repo is linked at…


Matt Creel Reposted

The Mythic 3.3 Beta just dropped! All sorts of new features including a new Eventing System, more container types, more developer features, better sleep tracking features, and even SSO possibilities! posts.specterops.io/mythic-3-3-bet… Check it out!


Matt Creel Reposted

I've made some long awaited updates to SQLRecon! Here's a couple of videos highlighting some of the big additions. Tool: github.com/xforcered/SQLR… Check out this thread ⬇️


Matt Creel Reposted

I can make you click a phishing link. Want to know how? Just click this link and I will teach you ;) Don't worry. This is not a test. Nobody will know. Just do it: posts.specterops.io/i-will-make-yo…


Catch up on Forrest's phishing blogs if you haven't been following. Whole series is 🔥

Never say "click" in a #phishing email! Why? Let me show you: posts.specterops.io/fly-phishing-7…



Matt Creel Reposted

Been playing with lab automation with Ansible & ludus.cloud and released my recent project. If you are looking for a customizable SCCM home lab to practice tradecraft, check out the corresponding blog and repository! posts.specterops.io/automating-scc…


Was inspired by @vendetce to dig into Kerberos TGT renewal with Impacket this morning. Short example script in a PR here to do just that ⤵️ github.com/fortra/impacke…


Matt Creel Reposted

Code to trigger EFS without GUI interaction: gist.github.com/dadevel/903d78…


Loading...

Something went wrong.


Something went wrong.