Cneelis Profile Banner
Cn33liz Profile
Cn33liz

@Cneelis

Followers
13K
Following
10K
Media
224
Statuses
3K

Red teamer @ Outflank. Passionate about networking and cybersecurity | father of two superheroes.

Groningen, Nederland
Joined December 2010
Don't wanna be here? Send us removal request.
@Cneelis
Cn33liz
5 years
Want to supercharge your Beacons Object files with Direct SystemCalls? Check our latest @OutflankNL blog here: https://t.co/ilwtqhG1ek
Tweet card summary image
outflank.nl
In this post we will explore the use of direct system calls within Cobalt Strike Beacon Object Files (BOF).
7
159
293
@OutflankNL
Outflank
3 months
New blog! Here's our case study on using LLMs for accelerating offensive R&D. Our post details how we used Large Language Models to identify and exploit trapped COM objects. Next week at BlackHat we'll drop even hotter stuff on offensive AI research. 🔥 https://t.co/PFKGjc4sVX
Tweet card summary image
outflank.nl
By leveraging AI as a research accelerator, we can dedicate more time to refining, testing, and hardening the techniques that ultimately make it into OST.
3
68
174
@OutflankNL
Outflank
4 months
Have you always wanted to roll out your own offensive monitoring network? See how Async BOFs enable automatic notifications for when users log in, useful applications (such as password vaults) are started, or the user tries to log off/shut down. https://t.co/fLsj3ljk9L
1
36
116
@OutflankNL
Outflank
5 months
Who doesn't love a sequel? Part one our series on secure #enclaves for #offensive operations highlighted how enclaves work and how to develop your own. Part two is out now and shares what we discovered while digging into enclave internals: https://t.co/oe9A6Rp4tt
1
19
35
@joehowwolf
William Burgess
5 months
[BLOG] Dynamically Instrumenting Beacon with BeaconGate - For All Your Call Stack Spoofing Needs!
Tweet card summary image
cobaltstrike.com
See how to instrument Beacon via BeaconGate and walk through return address spoofing, indirect syscalls, and a call stack spoofing technique, Draugr.
4
50
115
@OutflankNL
Outflank
9 months
Virtual fortresses aren’t as invincible as they seem 🏰⚔️. Read about our latest research on using Secure Enclaves in Windows for offensive ops — plus fresh insights for red teamers. Check out Part 1 of our blog series here: https://t.co/I7eDWJFMQp
2
41
86
@Cneelis
Cn33liz
10 months
Just finished this mix on my brand new AlphaTheta XDJ-AZ 🤩💪 It’s mix of progressive trance, which builds up to some nice uplifting trance bangers 😎 Some amazing new tracks included from @fariusmusic @djoliversmith @danstonemusic @RobertNickson https://t.co/wzSQT5kGlE
Tweet card summary image
mixcloud.com
Listen to Goosebump sessions 01 by Cornelis by Cornelis
1
0
10
@buffaloverflow
Rich Warren
11 months
Today, we're releasing NachoVPN, our VPN client exploitation tool, as presented at SANS #HackfestHollywood 2024 🌮🔒 Find the details on the @AmberWolfSec blog, along with the individual advisories, including a not-yet-fully fixed PaloAlto GlobalProtect client RCE👀
10
56
150
@OutflankNL
Outflank
1 year
We worked with @_dirkjan to get this as an exclusive into Outflank Security Tooling with a new tool called ROADtune. ROADtune allows red teamers to: - bypass CAP by faking device compliance registration - loot secrets from applications pushed to compliant devices Cool stuff!
@_dirkjan
Dirk-jan
1 year
Pretty proud of this one, took a lot of work. And no, this device does not exist 😎
1
33
154
@_xpn_
Adam Chester 🏴‍☠️
1 year
For anyone who's badge I managed to "Pwnz0rz111" today at RedTreat, you can revert back to the "original" FW by booting the badge, and once my spooky purge face shows up, press the middle button (the up button) and then the top button (the select button). The image just overlays
1
11
87
@MarcOverIP
Marc Smeets
1 year
And thats a wrap of #RedTreat 2024 2 days of hardcore red teaming research and meeting other rt researchers and operators. Mind still 🤯 processing some of the discussions! Thanks to all the attendees and speakers for being present at our little conf! /c @MDSecLabs @OutflankNL
@MarcOverIP
Marc Smeets
1 year
Excellent group of red teamers: ✅ Fantastic talks line up: ✅ Awesome badge: ✅ #RedTreat
15
12
67
@OutflankNL
Outflank
1 year
New Blog Alert! 🚨 Introducing Early Cascade Injection, a stealthy process injection technique that targets Windows process creation, avoids cross-process APCs, and evades top-tier EDRs. Learn how it combines Early Bird APC Injection & EDR-Preloading: https://t.co/oWreVHNKyL
4
186
433
@Guid6F
Guido
1 year
I am excited to share that I have graduated for my master's degree in Cybersecurity from the Radboud University🎓. I completed my thesis "Endpoint Detection & Response Evasion during Windows Process Creation" with a 9/10!
3
3
20
@kyleavery_
Kyle Avery
1 year
We’ve been working on some really big stuff this year… and it’s finally ready to demo 😁
@OutflankNL
Outflank
1 year
Outflank’s @kyleavery_ will be presenting at Black Hat Business Hall at 1:30pm tomorrow, August 7th! He’ll be discussing strategies for running evasive red team engagements across Windows, MacOS, and Linux #BHUSA
2
6
41
@SpecterOps
SpecterOps
1 year
Even mature security orgs are vulnerable to NTLM relay attacks. In our latest blog post from @zyn3rgy explores a "lower-touch" method to control inbound 445/tcp traffic and leverage NTLM relay primitives more effectively. Read for more ⤵️
Tweet card summary image
posts.specterops.io
Even within organizations that have achieved a mature security posture, targeted NTLM relay attacks are still incredibly effective after…
7
91
249
@davepl1968
Dave W Plummer
1 year
How we did this in the old days: When I was on Windows, this was the type of thing that greeted you every morning. Every. Single. Morning. You see, we all had a secondary "debug" PC, and each night we'd run NTStress on all of them, and all the lab machines. NTStress would
75
305
2K
@OutflankNL
Outflank
1 year
It's not *always* about Windows--macOS and Linux #EDRs need attention, too! In our latest blog, @kyleavery_ explains more about the telemetry sources for these under-discussed #endpoint products> https://t.co/fxA5s7vKUH
1
50
95
@floesen_
🤷‍♂️
2 years
Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled. https://t.co/kN5MTieLLc
Tweet card summary image
github.com
Admin to Kernel code execution using the KSecDD driver - floesen/KExecDD
8
180
503
@__invictus_
Tim
2 years
I'm going to take this a step further and say segmentation has the biggest impact on early detection of an attack. Adversaries are generally lazy in the sense that they will take the path of least resistance. 1/n
@domchell
Dominic Chell 👻
2 years
The most effective controls I see in my red team engagements are practically cost-free… host based firewalls and tight segmentation give red teams a total headache
3
10
58