G0ldenGunSec Profile Banner
Dave Cossa Profile
Dave Cossa

@G0ldenGunSec

Followers
2K
Following
3K
Media
16
Statuses
798

Adversary Simulation @xforce/ Frequent reader of the first page of Google results / Occasional reader of the second page of Google results

USA
Joined September 2017
Don't wanna be here? Send us removal request.
@G0ldenGunSec
Dave Cossa
1 month
Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence.
Tweet card summary image
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
7
83
190
@G0ldenGunSec
Dave Cossa
2 days
RT @unsigned_sh0rt: Who doesn't like free creds?.
0
10
0
@G0ldenGunSec
Dave Cossa
3 days
RT @PyroTek3: I am back to posting to in my free time (which I have again). I plan on adding new content relating….
0
111
0
@G0ldenGunSec
Dave Cossa
4 days
RT @BouncyHat: Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available….
Tweet card summary image
github.com
A tool to transform Chromium browsers into a C2 Implant - praetorian-inc/ChromeAlone
0
56
0
@G0ldenGunSec
Dave Cossa
7 days
RT @micahvandeusen: Search 15M+ Microsoft 365 tenants by org name or domain and discover all known domains in the same tenant: https://t.co….
0
74
0
@G0ldenGunSec
Dave Cossa
8 days
RT @_dirkjan: The ADSyncCertDump tool is now part of the adconnectdump tools and can be used to extract SP credentials from Entra ID connec….
0
100
0
@G0ldenGunSec
Dave Cossa
12 days
RT @retBandit: I'll be speaking on "AI’s Acceleration Of Cyber & Electronic Warfare" Thursday at the AI Security Forum, hit me up if you'd….
0
6
0
@G0ldenGunSec
Dave Cossa
13 days
More on BH OpenGraph: Ran into some issues when attempting to map objects collected with partial info back to existing BH objects. Built out a small tool that allows for connecting objects in a more flexible manner:
Tweet card summary image
github.com
Middleware utility for enriching and uploading data gathered with arbitrary collectors - G0ldenGunSec/OpenImporter
1
22
59
@G0ldenGunSec
Dave Cossa
16 days
New BH OpenGraph stuff is pretty cool, threw together a super basic PoC to map attack paths through SCCM this afternoon using data pulled from the site DB:
Tweet media one
5
26
85
@G0ldenGunSec
Dave Cossa
16 days
RT @FuzzySec: I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent….
Tweet card summary image
github.com
Backend development stack for agents. Contribute to xforcered/Agent-Development-Stack development by creating an account on GitHub.
0
37
0
@G0ldenGunSec
Dave Cossa
16 days
RT @_Mayyhem: I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MS….
0
204
0
@G0ldenGunSec
Dave Cossa
16 days
RT @SpecterOps: BloodHound v8.0 is here! 🎉. This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by….
0
60
0
@G0ldenGunSec
Dave Cossa
20 days
RT @_logangoins: My first @SpecterOps blog!. Ever wanted to collect Active Directory information from LDAP for a Red Team?. Using LDAP's mo….
Tweet card summary image
specterops.io
Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments
0
100
0
@G0ldenGunSec
Dave Cossa
23 days
RT @KlezVirus: Had some time and decided to take a shot at Fabian’s RAITrigger project. After a look into the RPC internals, I put together….
Tweet card summary image
github.com
Local SYSTEM auth trigger for relaying - X. Contribute to klezVirus/RAIWhateverTrigger development by creating an account on GitHub.
0
71
0
@G0ldenGunSec
Dave Cossa
28 days
RT @SEKTOR7net: Bypassing AMSI with your own custom COM interfaces inside CLR process - an excellent piece by Joshua Magri (@passthehashbrw….
0
70
0
@G0ldenGunSec
Dave Cossa
28 days
RT @TEMP43487580: Uploaded mprecon, a tiny script I made while learning SCCM. It pulls info from MP server like DP locations, site version,….
Tweet card summary image
github.com
a small script to collect information from a management point - GitHub - temp43487580/mprecon: a small script to collect information from a management point
0
21
0
@G0ldenGunSec
Dave Cossa
1 month
RT @retBandit: I recently interviewed with Politico on the risks and benefits of the offensive use of AI. “This isn’t just malicious threa….
0
4
0
@G0ldenGunSec
Dave Cossa
1 month
RT @ShitSecure: The Blog post about "Revisiting Cross Session Activation attacks" is now also public. Lateral Movement with code execution….
Tweet card summary image
r-tec.net
This blog post revisits Cross Session Activation attacks
0
66
0
@G0ldenGunSec
Dave Cossa
1 month
RT @Flangvik: New video out 😊 showing how you can take control of port 445 and perform those magical relay attacks toward AD CS when workin….
0
82
0