MDSecLabs Profile Banner
MDSec Profile
MDSec

@MDSecLabs

Followers
15K
Following
1K
Media
176
Statuses
1K

Consultancy and Training from a trusted supplier of offensive security. Red Team and Adversary Simulation by ActiveBreach team | https://t.co/fqpbJ9WDXD | https://t.co/UvOhGA4Zou

United Kingdom
Joined July 2011
Don't wanna be here? Send us removal request.
@MDSecLabs
MDSec
6 months
January 27th 15:30 GMT. Join us for a live webinar showcasing some of Nighthawk's key features and evasive capabilities. Orgs can apply to register here:.
0
5
29
@MDSecLabs
MDSec
2 days
RT @XintraOrg: Massive thanks to @MDSecLabs @offensiveninja for this awesome lab! 😍
Tweet media one
0
3
0
@MDSecLabs
MDSec
24 days
RT @5mukx: I have done Parallel syscall technique in Rust. Inspired by @MDSecLabs Research. #research #poc #ru….
0
45
0
@MDSecLabs
MDSec
3 months
RT @0patch: We'd like to thank our sources researching various NTLM hash leak issues:.1) @domchell of @MDSecLabs: 2….
0
3
0
@MDSecLabs
MDSec
3 months
RT @domchell: Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch….
0
52
0
@MDSecLabs
MDSec
3 months
Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by @__invictus_
Tweet media one
8
100
325
@MDSecLabs
MDSec
4 months
RT @XintraOrg: Already three people have fully smashed the Mustang Panda lab with FULL points (zero hints used) over the weekend by @MDSecL….
0
3
0
@MDSecLabs
MDSec
4 months
RT @inversecos: The Council of Tropical Affairs, while negotiating the mango export deal, have noticed suspicious activity on their network….
0
9
0
@MDSecLabs
MDSec
4 months
RT @inversecos: NEW LAB: Mustang Panda 🐼🔍. Chinese cyber espionage APT targeting a government body across the U.S, Europe, and APAC. Test y….
0
84
0
@MDSecLabs
MDSec
4 months
RT @domchell: Last year's @BlackHatEvents was a blast so we're doing it all again! Join me and the @MDSeclabs crew in Vegas. Early bird dis….
0
14
0
@MDSecLabs
MDSec
5 months
RT @_dirkjan: I'm not doing training at BH USA this year, but some friends are and I highly recommend their courses:.- Adv Detection Engine….
0
14
0
@MDSecLabs
MDSec
6 months
Please note, if you register for this with anything but a business email you will be rejected 🕵️.
@MDSecLabs
MDSec
6 months
January 27th 15:30 GMT. Join us for a live webinar showcasing some of Nighthawk's key features and evasive capabilities. Orgs can apply to register here:.
4
1
11
@MDSecLabs
MDSec
6 months
Hacky Christmas to all, see you in 2025 🎄🎅
Tweet media one
1
2
19
@MDSecLabs
MDSec
7 months
Ever come across Altiris on a red team? We did. Check out this post from @breakfix on how to extract ACC creds. Extracting Account Connectivity Credentials (ACCs) from Symantec Management Agent (aka Altiris).
Tweet media one
0
64
124
@MDSecLabs
MDSec
7 months
RT @C5pider: @MDSecLabs great work to the Nighthawk team :).Very impressive set of new features.
0
2
0
@MDSecLabs
MDSec
7 months
Ready for some Thanks Giving reading? Nighthawk 0.3.3 Evanesco is now live for customers #happythanksgiving
Tweet media one
5
29
80
@MDSecLabs
MDSec
8 months
RT @clintgibler: 😈 Common Detection & Evasion Techniques for Web Application Firewalls. → Fuzzing, reversing regex rules, obfuscation/encod….
0
8
0
@MDSecLabs
MDSec
8 months
RT @XssPayloads: When WAFs Go Awry: Common Detection & Evasion Techniques for Web Application Firewalls, a good compilation of evasion tech….
0
14
0
@MDSecLabs
MDSec
8 months
RT @lastweekinfosec: WAF bypasses (@MDSecLabs), sastsweep (@_chebuya), and more!
0
12
0
@MDSecLabs
MDSec
8 months
RT @GrahamHelton3: Further reading from @MDSecLabs .
0
1
0