BlWasp_ Profile Banner
BlackWasp Profile
BlackWasp

@BlWasp_

Followers
2K
Following
10K
Media
40
Statuses
888

Pentester and Red Team technical leader at Advens | Microsoft MVP

Joined August 2016
Don't wanna be here? Send us removal request.
@BlWasp_
BlackWasp
2 years
I'v recently updated my Active Directory cheatsheets. I'v added attacks regarding krbjack, GPOditty, SCCM, RODC pivoting, External Trust non-transitivity bypass, DES attacks, and others. If interested :.- AD : - AD Python :
5
162
481
@BlWasp_
BlackWasp
7 days
I have just finished an update on WDSFinder, right before my rump at @WineRump : WDSFinder now supports LDAPS with Channel Binding, and LDAP with Session Signing enforced!.The code may also prove useful for those trying to use these protocols in Rust.✌️.
Tweet card summary image
github.com
This new version adds the capability to authenticate and request LDAP when Session Signing is Enforced. Additionally, LDAPS is now also supported, even with Channel Binding set to Always.
0
3
27
@grok
Grok
19 days
Blazing-fast image creation – using just your voice. Try Grok Imagine.
284
557
3K
@BlWasp_
BlackWasp
18 days
See you there 🤞.
@WineRump
WineRump
18 days
Quatrième rump:. "MDT, where are you ?" par @BlWasp_ qui revient cette année lui aussi.
0
0
5
@BlWasp_
BlackWasp
1 month
Thanks @SentinelOne for the gift 😄
Tweet media one
2
1
19
@BlWasp_
BlackWasp
2 months
RT @C5pider: Introducing Havoc Professional: A Lethal Presence. We’re excited to share a first look at Havoc Professional, a next-generatio….
Tweet card summary image
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
0
185
0
@BlWasp_
BlackWasp
2 months
Additionally, I have coded a little tool to automate the detection of these shares:
Tweet card summary image
github.com
A simple tool to identify WDS servers in Active Directory - BlWasp/WDSFinder
1
4
34
@BlWasp_
BlackWasp
2 months
Some weeks ago, @TrustedSec has posted a really interesting blog post about the MDT shares, and credentials that can be found inside. But one question remained unanswered: where are they? I have tried to answer this question:.
5
43
135
@BlWasp_
BlackWasp
3 months
Currently, if this patch is not deployed in an Active Directory, anyone with a user account is able to takeover any assets, except for DC, by default!.
@Synacktiv
Synacktiv
3 months
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.
0
1
6
@BlWasp_
BlackWasp
3 months
Things are getting serious!.
@exegogol
Exegol
3 months
Exegol goes Pro! We're thrilled to announce that we're launching our company, so that Exegol becomes our Top priority. See our announcement on YouTube:
0
0
1
@BlWasp_
BlackWasp
4 months
RT @_atsika: If you thought phishing was now ineffective, you may have missed something 👀. My latest post highlights the advanced tactics u….
0
32
0
@BlWasp_
BlackWasp
4 months
I've just completed the @MalDevAcademy Malware Development Course. The course presents modern techniques for bypassing security solutions, low-level development and evasion. I would totally recommend this course to Red Team operators requiring a high level of discretion!.
0
3
21
@BlWasp_
BlackWasp
4 months
RT @_nwodtuhs: Kerberos relay on The Hacker Recipes, brought to you by @BlWasp_ 💪
Tweet card summary image
thehacker.recipes
MITRE ATT&CK™ Sub-technique T1557.001
0
58
0
@BlWasp_
BlackWasp
5 months
Just finished to refactor my network #pivoting cheatsheet!.If you are in an internal engagement, and you're stuck on a pivot, perhaps the solution will lie there:.
0
21
66
@BlWasp_
BlackWasp
6 months
Following the recent @Synacktiv 's article about abusing WebClient authentications from multicast poisoning, I have made a quick PR on Responder to simplify the setup:
Tweet card summary image
github.com
Hello! In this recent article, Synacktiv demonstrated that during multicast poisoning, depending on the error code returned by the SMB server at the end of the authentication process, it was possib...
0
25
80
@BlWasp_
BlackWasp
6 months
RT @pentest_swissky: Make Bloodhound Cool Again: Migrating Custom Queries from Legacy BloodHound to BloodHound CE.
Tweet card summary image
medium.com
We love the new Bloodhound version, it is faster, prettier, and more robust. However, due to the lack of many custom queries, we often…
0
31
0
@BlWasp_
BlackWasp
6 months
RT @M4yFly: New Active Directory Mindmap v2025.03! 🚀. 📖 Readable version: 🔧 Now fully generated from markdown file….
0
329
0
@BlWasp_
BlackWasp
6 months
RT @al3x_n3ff: This looks off to you? Yeah. In the default configuration, NFS exposes THE ENTIRE FILE SYSTEM and not only the exported d….
0
87
0
@BlWasp_
BlackWasp
6 months
RT @Synacktiv: In our latest article, @l4x4 revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminat….
Tweet card summary image
synacktiv.com
LSA Secrets: revisiting secretsdump
0
149
0
@BlWasp_
BlackWasp
7 months
RT @Synacktiv: Following the release of IPSpinner last week, now is the time to unveil CaptainCredz! Perform advanced, fine-grained passwor….
Tweet card summary image
github.com
CaptainCredz is a modular and discreet password-spraying tool. - synacktiv/captaincredz
0
62
0
@BlWasp_
BlackWasp
7 months
An interesting package just arrived at home! 👀. I'm starting to contribute to the DVID project by writing new trainings, and working on the wiki page. 🚀.If you are interested IoT security, check it out !.
Tweet media one
0
2
15
@BlWasp_
BlackWasp
7 months
Pretty interesting article to start digging into Intune !.
@_wald0
Andy Robbins
8 months
In Part 1 of my Intune Attack Paths series, I discuss the fundamental components and mechanics of Intune that lead to the emergence of attack paths:
0
0
0