
Dave Cossa
@G0ldenGunSec
Followers
2K
Following
3K
Media
16
Statuses
798
Adversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results
USA
Joined September 2017
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
7
83
190
RT @PyroTek3: I am back to posting to in my free time (which I have again). I plan on adding new content relating….
0
111
0
RT @BouncyHat: Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available….
github.com
A tool to transform Chromium browsers into a C2 Implant - praetorian-inc/ChromeAlone
0
56
0
RT @the1bernard: Missed my Black Hat talk? Read how I got access to 22 internal Microsoft services at
research.eye.security
The Eye Security Research team has uncovered a new critical misconfiguration that exposed sensitive data at internal Microsoft applications.
0
23
0
RT @micahvandeusen: Search 15M+ Microsoft 365 tenants by org name or domain and discover all known domains in the same tenant: https://t.co….
0
74
0
RT @unsigned_sh0rt: I pushed updates to SCCMHunter as part of my Arsenal demo at #BHUSA today! New features include a relay module for TAK….
github.com
[1.1.10] - 2025-08-06 Added Relay Module Added a new module to support TAKEOVER-5. Operators can relay coerced authentication to the SMS Provider role to compromise SCCM. HTTP Module Thanks ...
0
48
0
RT @_dirkjan: The ADSyncCertDump tool is now part of the adconnectdump tools and can be used to extract SP credentials from Entra ID connec….
0
100
0
RT @retBandit: I'll be speaking on "AI’s Acceleration Of Cyber & Electronic Warfare" Thursday at the AI Security Forum, hit me up if you'd….
0
6
0
More on BH OpenGraph: Ran into some issues when attempting to map objects collected with partial info back to existing BH objects. Built out a small tool that allows for connecting objects in a more flexible manner:
github.com
Middleware utility for enriching and uploading data gathered with arbitrary collectors - G0ldenGunSec/OpenImporter
1
22
59
RT @FuzzySec: I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent….
github.com
Backend development stack for agents. Contribute to xforcered/Agent-Development-Stack development by creating an account on GitHub.
0
37
0
RT @_Mayyhem: I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MS….
0
204
0
RT @SpecterOps: BloodHound v8.0 is here! 🎉. This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by….
0
60
0
RT @_logangoins: My first @SpecterOps blog!. Ever wanted to collect Active Directory information from LDAP for a Red Team?. Using LDAP's mo….
specterops.io
Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments
0
100
0
RT @KlezVirus: Had some time and decided to take a shot at Fabian’s RAITrigger project. After a look into the RPC internals, I put together….
github.com
Local SYSTEM auth trigger for relaying - X. Contribute to klezVirus/RAIWhateverTrigger development by creating an account on GitHub.
0
71
0
RT @SEKTOR7net: Bypassing AMSI with your own custom COM interfaces inside CLR process - an excellent piece by Joshua Magri (@passthehashbrw….
0
70
0
RT @TEMP43487580: Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version,….
github.com
a small script to collect information from a management point - GitHub - temp43487580/mprecon: a small script to collect information from a management point
0
21
0
RT @retBandit: I recently interviewed with Politico on the risks and benefits of the offensive use of AI. “This isn’t just malicious threa….
0
4
0
RT @ShitSecure: The Blog post about "Revisiting Cross Session Activation attacks" is now also public. Lateral Movement with code execution….
r-tec.net
This blog post revisits Cross Session Activation attacks
0
66
0
RT @Flangvik: New video out 😊 showing how you can take control of port 445 and perform those magical relay attacks toward AD CS when workin….
0
82
0