Memory_before Profile Banner
XiaoliChan Profile
XiaoliChan

@Memory_before

Followers
294
Following
2K
Media
3
Statuses
1K

Hey👋 , XiaoliChan is here

Joined January 2017
Don't wanna be here? Send us removal request.
@Memory_before
XiaoliChan
2 days
RT @mpgn_x64: Writeup from @mael91620 is now available 🎉. From coerce into SPN less RBDC, gmsa decryption, dpapi, constraint delegation w/….
Tweet card summary image
github.com
Full write-up for the Active Directory Lab built for Barbhack 2025 by @mpgn and my contributions. - mael91620/Barbhack-2025-AD-writeup
0
39
0
@Memory_before
XiaoliChan
2 days
RT @guyrleech: Did you know that Entra ID SIDs start S-1-12-1 whereas (legacy?) AD domain and local normal accounts start S-1-5-21 ? https:….
0
62
0
@grok
Grok
26 days
Generate videos in just a few seconds. Try Grok Imagine, free for a limited time.
522
942
4K
@Memory_before
XiaoliChan
8 days
RT @5mukx: Dive into PEB Walk in Malware Analysis.
Tweet media one
0
44
0
@Memory_before
XiaoliChan
1 month
RT @5mukx: From NTLM relay to Kerberos relay: Everything you need to know.
Tweet media one
0
39
0
@Memory_before
XiaoliChan
1 month
RT @_logangoins: Made some changes to SoaPy to allow ADWS recon to be ingested into @Tw1sm 's BOFHound offline for upload to BloodHound. A….
Tweet card summary image
github.com
SOAPy is a Proof of Concept (PoC) tool for conducting offensive interaction with Active Directory Web Services (ADWS) from Linux hosts. - logangoins/SOAPy
0
23
0
@Memory_before
XiaoliChan
2 months
RT @ShitSecure: This is so much! 🔥🔥😎. Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth….
Tweet card summary image
github.com
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully...
0
181
0
@Memory_before
XiaoliChan
2 months
RT @mpgn_x64: Wanna see something cool about RDP and NetExec ?
Tweet media one
0
182
0
@Memory_before
XiaoliChan
2 months
RT @0x64616e: Onboard yourself - PaloAlto Global Protect edition:.1. Become local admin.2. Export device cert from original workstation.3.….
0
104
0
@Memory_before
XiaoliChan
2 months
RT @seriotonctf: updated my ADCS cheatsheet.
Tweet card summary image
seriotonctf.github.io
ADCS Attacks with Certipy cheatsheet
0
69
0
@Memory_before
XiaoliChan
2 months
RT @5mukx: NtSockets: An Improved Version of HTTP File Downloader using NtCreateFile and NtDeviceIoControlFile. Code: .
0
29
0
@Memory_before
XiaoliChan
2 months
RT @5mukx: An Improved Reflective DLL Injection Technique.
Tweet media one
Tweet media two
0
50
0
@Memory_before
XiaoliChan
2 months
RT @ACEResponder: Windows events that identify AD user object takeover. #ThreatHunting #DFIR
Tweet media one
0
49
0
@Memory_before
XiaoliChan
2 months
RT @5mukx: Walkthrough of shellcode reflective DLL injection (sRDI).
Tweet media one
0
51
0
@Memory_before
XiaoliChan
3 months
RT @5mukx: Playbook Hunting Chinese APT.an Chinese APT TTPs and LOLBAS Operations.
Tweet card summary image
detect.fyi
Chinese APT TTPs and LOLBAS Operations
0
91
0
@Memory_before
XiaoliChan
3 months
RT @RedTeamPT: 🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:. 🪞 The Reflective Kerberos Relay Attack - Remo….
Tweet card summary image
blog.redteam-pentesting.de
It is a sad truth in IT security that some vulnerabilities never quite want to die and time and time again, vulnerabilities that have long been fixed get revived and come right back at you. While...
0
176
0
@Memory_before
XiaoliChan
3 months
RT @LazyTitan33: Excellent article from @Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not….
0
94
0
@Memory_before
XiaoliChan
3 months
RT @jeffmcjunkin: Smells like authenticated (as any user) RCE as SYSTEM. So not quite MS17-010 levels of bad (as that requires no authent….
0
37
0