247CTF Profile Banner
247CTF Profile
247CTF

@247CTF

Followers
5K
Following
590
Media
102
Statuses
2K

🏆 The 247CTF continuous security competition 📺 YouTube for CTF fundamentals https://t.co/0RP7w5pej2 🏁 https://t.co/FATXT1bqrW for CTF challenges

Australia
Joined April 2019
Don't wanna be here? Send us removal request.
@247CTF
247CTF
5 years
247CTF{f9591934c302bc8a29fad566fcf438cd}.
9
4
82
@247CTF
247CTF
2 years
RT @Synacktiv: During a recent Active Directory intrusion test, @croco_byte was led to devise a new versatile attack vector targeting Group….
Tweet media one
www.synacktiv.com
0
109
0
@247CTF
247CTF
2 years
RT @_nwodtuhs: Here is a first draft on an NTLM relay mindmap 🙂 from authentication coercion to post-relay exploitation. I'll gladly update….
0
313
0
@247CTF
247CTF
2 years
RT @netbiosX: EDRSandblast-GodFault: a tool written in C that weaponize a vulnerable signed driver to bypass EDR detections (Notify Routine….
Tweet media one
github.com
EDRSandblast-GodFault. Contribute to gabriellandau/EDRSandblast-GodFault development by creating an account on GitHub.
0
57
0
@247CTF
247CTF
2 years
RT @0xor0ne: A few years old but a very well written white paper on Linux containers.Credits @NCCGroupplc. #Linux….
0
61
0
@247CTF
247CTF
2 years
RT @assume_breach: I just published Home Grown Red Team: SMB Pivots With Havoc C2 . An updated article for lateral….
Tweet media one
link.medium.com
Welcome back! Today we’re going to talk about some lateral movement techniques with Havoc C2 using SMB pivots. SMB pivots are great for…
0
124
0
@247CTF
247CTF
2 years
RT @Rhynorater: SUCH a good read. I love the section where they explicitly explain the process used to write custom shellcode for OpenBSD.….
www.assetnote.io
0
41
0
@247CTF
247CTF
2 years
RT @dec0ne: Excited to share my new research: a POC of a new “threadless” process injection technique that works by utilizing the concept o….
0
142
0
@247CTF
247CTF
2 years
RT @bishopfox: When making the vulnerable #AWS environment CloudFoxable, @sethsec drew inspo from #security tools like #CloudGoat, https://….
0
9
0
@247CTF
247CTF
2 years
RT @ellishlomo: It's only a service principal.
0
53
0
@247CTF
247CTF
2 years
RT @SpecterOps: Continuing their journey through offensive data, @harmj0y, @tifkin_, and @0xdab0 break down some common challenges in post-….
Tweet media one
posts.specterops.io
In our previous post, we talked about the problem of structured data in the post-exploitation community. We touched on the existing…
0
19
0
@247CTF
247CTF
2 years
RT @dottor_morte: Me and @Her0_IT did a fair bit of research against one of the leading EDRs in the sector. This first post will hopefully….
riccardoancarani.github.io
For some fun and a fair bit of profit
0
71
0
@247CTF
247CTF
2 years
RT @dunderhay: Published a write-up on successfully phishing a target using AD FS with MFA. Covers some of the challenges and how I finally….
Tweet media one
research.aurainfosec.io
A detailed walkthrough of the process and hurdles faced in leveraging Evilginx3 to conduct a successful phishing campaign on a AD FS protected domain.
0
115
0
@247CTF
247CTF
2 years
RT @D1rkMtr: Blog on Advanced module stomping and Heap/Stack Encryption is now out, it bypass PE-Sieve and Moneta while sleeping. Blog : ht….
Tweet media one
github.com
Implementation of Advanced Module Stomping and Heap/Stack Encryption - CognisysGroup/SweetDreams
0
119
0