Incognito Profile
Incognito

@IncognitoSearch

Followers
53
Following
7K
Media
1
Statuses
617

Joined January 2019
Don't wanna be here? Send us removal request.
@originhq
Prelude Research
1 month
New on the blog: @michaelbarclay_ revives registry-based tradecraft using a telemetry gap in the hive restoration process. The blog also includes PoC code and detection guidance. 📃
Tweet card summary image
originhq.com
Enabling you to safely give AI agents the permissions they need, so they can give you the productivity you demand.
4
15
63
@lefterispan
Lefteris Panos
1 month
Implemented a number of persistence methods in a BOF. Nothing ground breaking but might be useful to some.
Tweet card summary image
github.com
a BOF implementation of various registry persistence methods - leftp/RegPersist
0
20
60
@YOLOP0wn
YOLOP0wn
2 months
Inspired by @TrustedSec article on remotely starting Windows services, enjoy our python unauthenticated EFS trigger developed with @Hypnoze57 Enjoy! https://t.co/lfXowfPYtv
Tweet card summary image
github.com
Unauthenticated start EFS service on remote Windows host (make PetitPotam great again) - Hypnoze57/rpc2efs
2
65
183
@sekurlsa_pw
🕳
2 months
Google research created a dataset with rainbow tables for NetNTLMv1 with the 1122334455667788 challenge. https://t.co/fLBxwTIY2H Dataset is available for download at: ▪️ https://t.co/mCt6R7y5Pk [Login required] ▪️gs://net-ntlmv1-tables
2
111
404
@SpecterOps
SpecterOps
2 months
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
308
658
@ShitSecure
S3cur3Th1sSh1t
2 months
Remotely enable the EFS service for Win11 systems? No problem with rpcping. Just worked for me from remote with a low privileged user. 🧐
@TrustedSec
TrustedSec
2 months
Service triggers can be a pentester’s secret weapon, letting low-priv users quietly fire up powerful services. In our new blog, @freefirex2 breaks down the types of service triggers that exist and how they can be activated with little to no code required.
2
43
212
@codewhisperer84
codewhisperer84
3 months
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. https://t.co/GC5wA2y3EO
Tweet card summary image
github.com
Windows protocol library, including SMB and RPC implementations, among others. - trustedsec/Titanis
14
187
557
@malmoeb
Stephan Berger
5 months
What I learned today. Nice - I wasn't aware of the InstallProduct method from PowerShell to fetch a remotely hosted MSI file and subsequently install it. Invoke-WebRequest is one of the more popular methods, at least in our incident response cases. As always, there is more!
2
37
155
@HackingLZ
Justin Elze
5 months
Whenever I see people say the red teaming should only use TI, it seems unusual because if you're mature enough to need a red team, your EDR vendor will likely pick up on many currently known threats in the public eye. At that point, you're stuck modifying things away from what's
13
23
159
@ShitSecure
S3cur3Th1sSh1t
5 months
This is so much! 🔥🔥😎 Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate. https://t.co/H83AIxtskn
Tweet card summary image
github.com
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully...
5
182
580
@_dirkjan
Dirk-jan
6 months
Since several people already asked: the slides from @fabian_bader and myself for @WEareTROOPERS are available! "Finding Entra ID CA bypasses-the structured way". We talked about FOCI, BroCI, CA bypasses, scopes and getting tons of tokens. Check it at
dirkjanm.io
1
87
230
@_RastaMouse
Rasta Mouse
6 months
[BLOG] Integrating Tradecraft Garden PIC loaders into Cobalt Strike https://t.co/vHZyptx3xo
1
37
131
@rad9800
Rad
6 months
While posted jokingly, "Read Teaming" is very much is the reality of the current state of Red Teaming. If you want to learn about why this approach is both highly effective and gaining popularity, check out: https://t.co/rj9CPeEI0Y
deceptiq.com
Discover why 'Read Teaming' attacks bypass traditional security. Learn how attackers use your own documentation against you and why deception is critical.
@rad9800
Rad
8 months
If you can motivate yourself to spend 8+ hours a day, 5 days a week to read through: - Atlassian - Jira - Slack - GitHub - Other internal SaaS applications without guaranteed results, you'll be an amazing red teamer.
2
14
80
@5mukx
Smukx.E
7 months
WMI Research and Lateral Movement https://t.co/IL3Ucc5SC0 TLDR: In this article, we will go over the WMI technology, the potential attack vectors it opens, some detection pitfalls (from an attacker’s perspective), and how we can enumerate the technology for useful capabilities.
3
75
320
@0xBoku
Bobby Cooke
9 months
As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! https://t.co/fR44ukK1Y2
Tweet card summary image
github.com
🧙‍♂️ Node.js Command & Control for Script-Jacking Vulnerable Electron Applications - boku7/Loki
27
239
707
@decoder_it
Andrea P
9 months
KrbRelayEx-RPC tool is out! 🎉 Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;) https://t.co/Aebt5iFIjC
6
161
393
@orange_8361
Orange Tsai 🍊
11 months
The detailed version of our #WorstFit attack is available now! 🔥 Check it out! 👉 https://t.co/EWlBSgXhpx cc: @_splitline_
Tweet card summary image
blog.orange.tw
📌 This is a cross-post from DEVCORE. The research was first published at Black Hat Europe 2024. Personally, I would like to thank splitline, the co-author of this research & article, whose help
@orange_8361
Orange Tsai 🍊
1 year
Our talk at #BHEU is done! Hope you all enjoyed it. 😉 A detailed blog is on the way, but in the meantime, check out the pre-alpha website https://t.co/lGRfqhmcVK for early access and the slides! Huge thanks to @BlackHatEvents and my awesome co-presenter @_splitline_! 🐈‍
3
209
535
@usetraceix
Traceix
11 months
Worst fit is a Windows attack surface that exploits the Best-Fit charset conversion feature! This attack provides path traversal, argument injection, and RCE in numerous well known applications! Links in next post👇
2
14
63
@ahmadaccino
ahmadaccino
1 year
every time someone wants help with getting a job in cs and i recommend them a plan or a course they always end up not doing it i've had exactly 1 friend actually follow through and now he works at a large bank you need to do the hard things. the industry is tough. i find that
20
17
352