Similar User
@christruncer
@_nullbind
@obscuresec
@NullMode_
@ConsciousHacker
@ausernamedjosh
@benpturner
@1nPr0c
@ch1gg1ns
@porterhau5
@munrobotic
@mandreko
@jasonjfrank
@ThemsonMester
@overflowingInt
If you need to breach the perimeter, you should probably call @iglesiasgg from our @fusionx team: accenture.com/us-en/blogs/cy… Come work with us!
You should come work with @offenseindepth @Fusionx because he's a real badass: searchsecurity.techtarget.com/news/252505269…
some thoughts on syscalling in offsec tooling and EDRs dronesec.pw/blog/2021/05/1…
Exploiting leaked process and thread handles hatriot.github.io/blog/2019/08/2…
Accenture’s people-focused culture and innovative mindset are core values that both companies share... we are thrilled to be joining such a high-caliber global organization. - .@adamcecc, CEO, Deja vu Security, via .@InfosecurityMag accntu.re/2L4lqez
Does your #cybersecurity team need a sparring partner? Read how Accenture’s FusionX team can help. #cyberresilience accntu.re/2SRYsaZ
Due to popular demand we will be offering a training this year! Details to be released very soon. Please email training@ for a syllabus. @steventseeley is the lead trainer.
Today, I'm releasing V2 of my LDAPPER AD LDAP enum tool. This version comes with a lot more canned searches, and a much cleaner way of storing/adding canned searches. LDAPPER is a redteam tool that makes AD enumeration via LDAP easy. github.com/shellster/LDAP… /1
If your org's security depends on patching to prevent breaches, you have a very immature & brittle org -- especially as a high value target.
Abusing delay load DLLs for remote process injection hatriot.github.io/blog/2017/09/1…
The smart kids are at it again. Proud to have shared beers with @breenmachine and @dronesec foxglovesecurity.com/2017/08/25/abu…
I'm doing two web app hacking classes for free for *veterans only* at the end of August evite.me/fuwmjrvS5Y evite.me/4n5HtKrFek
You would not be disappointed with the work that is done here.
#RedTeamTip Need user IPs without noisy hunting scripts? Pull homeDirs from AD, pwn share, extract host from %USERPROFILE%\Links\Desktop.lnk
[New Post] Userland Persistence with Scheduled Tasks and COM Handler Hijacking: enigma0x3.net/2016/05/25/use…
United States Trends
- 1. UConn 8.697 posts
- 2. Jack Smith 134 B posts
- 3. Dan Hurley 1.267 posts
- 4. Solo Ball 1.111 posts
- 5. Tyrese Hunter N/A
- 6. lana 56,1 B posts
- 7. Maui 7.465 posts
- 8. Penny Hardaway N/A
- 9. Mahaney N/A
- 10. Kreider 3.930 posts
- 11. Samson 4.702 posts
- 12. Harrison Barnes 1.431 posts
- 13. Newcastle 24,5 B posts
- 14. #ysltrial 4.814 posts
- 15. Baymax 13,1 B posts
- 16. COTLTOOZ 1.221 posts
- 17. #Thanksgiving 16,2 B posts
- 18. Judge Chutkan 4.390 posts
- 19. Andretti 6.156 posts
- 20. West Ham 14,2 B posts
Who to follow
-
@[email protected]
@christruncer -
Scott Sutherland
@_nullbind -
obscuresec.bsky.social
@obscuresec -
Luke Rogerson
@NullMode_ -
Chris Spehn
@ConsciousHacker -
Josh Pitts
@ausernamedjosh -
Ben Turner 🇬🇧
@benpturner -
Jamie Shaw 🎅🎄
@1nPr0c -
Chris Higgins
@ch1gg1ns -
Tom Porter
@porterhau5 -
lɐʍɹǝuɔǝ ɯnuɹo
@munrobotic -
Matt Andreko
@mandreko -
Jason Frank
@jasonjfrank -
Themson Mester
@ThemsonMester -
overflowingInt
@overflowingInt
Something went wrong.
Something went wrong.