hackzzdogs's profile picture. Red teamer || Lab Creator for Offensive Security and Cyberseclabs || 🙂Human

hackzzdogs

@hackzzdogs

Red teamer || Lab Creator for Offensive Security and Cyberseclabs || 🙂Human

Joined March 2013
Similar User
Octoberfest73's profile picture. Red Team | Offensive Tool Dev | Malware Dev | OSCP | OSEP

@Octoberfest73

n1ghtmar3_2421's profile picture. Hey. It's me. Orin. I am a medical student, a Bug Bounty Hunter and a CTF Player

@n1ghtmar3_2421

AtharvShejwal's profile picture. Cyber Security |
bug bounty Hunter

@AtharvShejwal

DrippyRobin's profile picture. 19 • Security Researcher 📜

@DrippyRobin

0xdeaddood's profile picture. Security researcher 🇦🇷🇪🇪🏴‍☠️. Impacket 🚀🌕.

@0xdeaddood

anthemtotheego's profile picture. Adversary Simulation @ X-Force Red | Head of Capability R&D | Implant Dev | Work In Progress | Thoughts My Own | https://t.co/eNspx7jLvm

@anthemtotheego

netero_1010's profile picture. Red teamer,  my tools for red teaming: https://t.co/j6Z018m09L, my blog to share offensive security stuff: https://t.co/MKvSTjpWoi

@netero_1010

Geiseric4's profile picture. AD/Azure Enthusiast | eCPPTv2 | CRTP | CRTO | CRTE | CRTM | CARTP

https://t.co/yYy84cNFPw

@Geiseric4

machari4_'s profile picture. Tech | infosec | night owl

@machari4_

DebprasadBaner9's profile picture. Red Team Op / BBBH Hacked- Apple,Adobe,United Nations, Dutch government etc hunt for CVE's and write bad code. Malware Dev, EDR/AV Evasion

@DebprasadBaner9

tbhaxor's profile picture. Engineering | Physics | Maths

I ask silly questions to understand the nature.

@tbhaxor

N1tr0s_ken's profile picture. Eat Sleep Code Repeat

@N1tr0s_ken

r0g3rmr3n00b's profile picture. Proud Indian

@r0g3rmr3n00b

ahmadi98_'s profile picture. Student at Sharif University
Cryptography Researcher
ZKP , SANRKs, SNARGs ...
Security Enthusiastic
Trying to be happy :))

@ahmadi98_

MayerA7x's profile picture. Pentester/Security Analyst

@MayerA7x

Pinned

Hi everyone, this is my first blog regarding my first red teaming engagement where I bypassed Microsoft Endpoint solutions using the features provided by Microsoft.😛 hackzzdogs.gitbook.io/how-we-bypasse… #EDR #redteam #redteaming #cybersecurity


hackzzdogs Reposted

We proposed renewal of our certificates (#CRTP, #CRTE and others) with an 8 hour live exam without any cost. Received a lot of great comments from our past students. Now throwing it open to everyone. Please RT for reach. How would you like your Infosec certs?


hackzzdogs Reposted

Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…

_xpn_'s tweet image. Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…

hackzzdogs Reposted

Dependency confusion - mismanaged by @Google security VRT giraffesecurity.dev/posts/google-r… Had the exploiter been malicious this could have led to product compromise, back door, and enterprise access.


hackzzdogs Reposted

Just submitted my talk proposal to Black Hat USA!🤞 Psyched to share some wild techniques that should burn for a long time after! #BHUSA


The actual truth of current red teaming🥴

Red Team 2.0 appears to become: 1) Give a machine on the internal network because phish fail. 2) Disable EDR because can't seem to bypass the EDR. 3) Can't figure out how to pivot network segment. 4) ... Dude, why not just ask to be put on the core banking system?



Finally, after 2 years of plan, I "Tried harder"🥴. Now I am a Offensive Security Certified Professional. #OSCP Just got a new Offensive Security credential via @Accredible for sgq.io/Fc7FYij via @offsectraining


hackzzdogs Reposted

So much great information here thanks for taking the time to put it together and share :)


hackzzdogs Reposted

I'm a Head of Finance at Google. I've interviewed 100s of candidates in my career and I know my decision within the first 7 minutes. Do these 5 things to prepare for the interview and I guarantee you'll impress recruiters and hiring managers at your dream company:


hackzzdogs Reposted

After years of using the default examples, I've finally started writing my own custom scripts using Impacket. Wanted to share a few examples that helped me during the learning process. Hope you enjoy! github.com/icyguider/More…


hackzzdogs Reposted

Great 🤩

We worked together with @_zblurx to pull this new feature on CME ! CrackMapExec can now authenticate using kerberos with login/pass/nthash/aeskey without the need of a KRB5CCNAME ticket env 🚀 But wait there is more! by adding this feature we can now mimic kerbrute features 🔥🫡

mpgn_x64's tweet image. We worked together with @_zblurx to pull this new feature on CME ! CrackMapExec can now authenticate using kerberos with login/pass/nthash/aeskey without the need of a KRB5CCNAME ticket env 🚀

But wait there is more! by adding this feature we can now mimic kerbrute features 🔥🫡


Great video🙂🔥

Mystified by HTTP/3 connection contamination? I've recorded a 5-minute, ultra simple explanation also covering the entire history of HTTP connection-reuse! youtube.com/watch?v=-mHjTE…



hackzzdogs Reposted

You can now use ngrok without even installing ngrok 🤯

hakluke's tweet image. You can now use ngrok without even installing ngrok 🤯

hackzzdogs Reposted

The good old "attacker@attacker.com,victim@victim.com" strikes again github.com/advisories/GHS…


Loading...

Something went wrong.


Something went wrong.