r0BIT
@0xr0BIT
Followers
829
Following
742
Media
18
Statuses
352
I can make computers do funny things lol
The Basement
Joined January 2023
First blogpost in a while, check it out! PoC is a Crystal Palace shared library, format inspired by @_RastaMouse's LibTP https://t.co/7nGj4OyGrZ
Callstacks are largely used by the Elastic EDR to detect malicious activity. @SAERXCIT details a technique to evade a callstack-based detection and allow shellcode to load a network module without getting detected. Post: https://t.co/hckL3n8it5 PoC: https://t.co/0dqBDQeKWm
0
20
77
I lied. It‘s TaskHound again. After the Feedback received I thought F€@%# it, might as well go all-in. Just submitted my session proposal for #SOCON2026 Maybe I‘ll see you there! (If my imposter syndrome hasn’r talked me out of it till then) https://t.co/Os8X3gpriG
sessionize.com
SO-CON 2026 features talks, trainings, and networking events focused on identity-based security and Attack Paths. It kicks off the week with a two-day...
1
0
4
This is (probably) the last time I‘ll nag you with TaskHound. Since my org doesn’t allow me to use memes in our official blogs I finally took the hint and stopped procrastinating. My personal Blog is now live :). https://t.co/Sp2aj2Y0EO (Disclaimer: may contain sarcasm and memes)
2
21
84
There is a huge disconnect between the suits that run information security places and have money versus the nerds that are employed there Over the years I've had a few cybersecurity companies approach me and discuss potential collaboration. Each time it was super PG, watered
55
38
602
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
3
91
219
If you’ve got solid python skills, strong appsec background & you’re curious about applying your skills to AI/ML security, come join my team at HiddenLayer. Great pay, benefits, fully remote, working alongside amazing talent & awesome people
job-boards.greenhouse.io
Remote, US
3
14
106
NetExec turned 2 years old this month🎉 Time to take a look at what have achieved so far! As I love stats, I want to share some imo interesting numbers about NetExec: 4,853⭐ ~100,000 clones/14 days => ~2,4mio clones ~7,200 unique clones/14 days => ~172,800 unique clones 1/4🧵
5
21
141
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
309
651
TaskHound just got 2 big updates! • BloodHound Live Connectors (thanks @al3x_n3ff ). Live queries, no manual exports needed • DPAPI Credential Blob Extraction + Offline Decryption (cheers @xct_de for the idea) Next up: OpenGraph for BloodHound :D 🔗
0
1
7
rolled out a bof for getting the dpapi_system key used by mimikatz /system: when ingesting master keys. If that's something you need it's live at https://t.co/lIBsG7JXWA
3
61
241
Ifrit Red Team Lab from @vulnlab_eu is now live on @hackthebox_eu! It’s modeled on a real engagement and includes a SIEM so you can check how "loud" you are. https://t.co/CieUYibbUC
0
16
80
TaskHound v0.9.0 is out! Now comes with BHCE export support. DPAPI Blob snatching is next on the todo. Back to Reading blogs it is :D https://t.co/2VjnXzoi3R
github.com
Tool to enumerate privileged Scheduled Tasks on Remote Systems - 1r0BIT/TaskHound
0
0
1
TL;DR: Semi-automate Remote SchedTask Parsing and look for privileged tasks by feeding bloodhound high-value targets. Noisy AF because impacket. https://t.co/UXJDulmZPL This is my first feeble attempt at maybe providing something somewhat useful for the Community. :)
github.com
Tool to enumerate privileged Scheduled Tasks on Remote Systems - 1r0BIT/TaskHound
0
7
29
Tengu was arguably my best work at the time. Enterprise only sadly but hopefully this changes in the Future :).
Did you mean to do that? 😳 TWO new Professional Labs are available on the #HTB Enterprise Platform! Pivot through misconfigurations, escalate across Linux & Windows, and claw your way to Domain Admin. Start now: https://t.co/BZb9hquFN0
#HackTheBox #Cybersecurity
0
0
1
Reaper is a fun one :-)
No cheating the reaper ☝️ 4 new labs are coming to the #HackTheBox platforms this week! 🔴 Reaper, a migrated #Vulnlab Machine created by xct 🔴 Sendai, a migrated #Vulnlab Machine created by xct 🔵 Malevolent ModMaker, a Sherlock created by grepStrength 🔴 Guardian, a Machine
2
4
44
The @vulnlab_eu track on @hackthebox_eu already has 15 machines now: https://t.co/FfjCrreecv Keep an eye out for Rainbow if you want to dive into Windows binary exploitation :)
1
13
79
Currently at the beach with the kids. What does this remind you of? Don’t tell me you can’t already hear the music :D
0
0
5
Well, it happened. The company I worked at for 6 years will be closing and thus I got laid off. This doesn't affect @octopwn operations in any negative ways, but I'm actively looking for a new day job. If someone has something please DM me. Retweets are appreciated.
7
121
187
Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch 🙏 @MDSecLabs
2
51
150