
CU
@CraigUnder
Followers
1K
Following
4K
Media
727
Statuses
4K
RT @ZephrFish: For a first public talk @CraigUnder did excellent, track 1 at @Steel_Con is always a pleasure
0
4
0
RT @myexploit2600: Enjoying @ZephrFish and @CraigUnder talk @Steel_Con . Told we can nerf if we hear swearing.
0
2
0
RT @ZephrFish: Ready for @Steel_Con today @CraigUnder and I will be speaking on track 1 and 1400-1500, come along and hear about the fun an….
0
2
0
RT @vxunderground: Dear Red Team nerds,. If you're curious what a successful and serious malware campaign looks like (if you want to make a….
0
293
0
RT @ZephrFish: If you're coming along to @Steel_Con next weekend, be sure to come along to track 1 for @CraigUnder and I's 'Drinking from t….
0
6
0
RT @Yeeb_: Created small tool that joins a device to a Tailscale network and exposes a local SOCKS proxy. It’s built for red team pivots an….
0
62
0
RT @ZephrFish: After lunch slot on track 1 with @CraigUnder for his first talk. Paired with me not sure if that's a good thing or not 🤣💪🏻.
0
2
0
RT @ZephrFish: LFG @CraigUnder and I will be speaking at @Steel_Con "Drinking from The Same Firehose - How Red Teams outrun Threat Actors"….
0
5
0
RT @Mandiant: 🚨 Ivanti Vulnerability (CVE-2025-22457) Actively Exploited. Mandiant & Ivanti discovered active exploitation of a critical bu….
0
31
0
RT @SkySportsDarts: GERWYN PRICE NINE-DARTER ALERT! 🚨. Price brings the house down in Manchester 🔥
0
439
0
RT @Tw1sm: Nothing new, but formalized some operator notes on Entra ID/Azure tradecraft I've found to be exceptionally useful on ops. Overl….
0
45
0
RT @pfiatde: Did you know, that PW "encryption" for ZIP files has some room for improvement and can be circumvented in some cases? Not new,….
0
25
0
RT @ShitSecure: When you found ExecuteDCOM permissions e.G. in BloodHound on a server system your options are limited because most code exe….
0
52
0