
Stu Kennedy
@NoobieDog
Followers
2K
Following
24K
Media
565
Statuses
13K
Maker, Hacker, Security Researcher, Motorsport Enthusiast!
GTFO
Joined June 2011
RT @theluemmel: P4wnP1 on the Zero 2 W? Sure why not.Detailed documentation? Sure why not.New images and instructi….
0
9
0
RT @podalirius_: 🔍 New tool in The Manticore Project: LDAPWordlistHarvester. This tool allows you to create precise wordlists for finding p….
0
32
0
RT @Steph3nSims: I posted a short 9-minute video on using MCP with IDA for vulnerability analysis. It's open to YouTube members now and wil….
0
39
0
RT @theluemmel: LOGITacker by @RoganDawes/@mame82 did no longer.- compile firmware .- hide PowerShell for covert channel. I removed verbosi….
0
8
0
RT @0xm1rch: I published blogs detailing two vulnerabilities I recently discovered in Sudo. Update to 1.9.17p1. CVE-2025-32462 - Sudo Host….
0
80
0
RT @_dirkjan: Pretty cool! If you use the tool with a public client and scope from you can add this to roadtx inter….
0
43
0
RT @tautology0: Explanation of my silliest abuse of technology yet. (Though it could have been Mariokart, it wasn't as there's no decent no….
0
1
0
RT @CyberWarship: ''Doppelganger: An Advanced LSASS Dumper with Process Cloning''. #infosec #pentest #redteam #blueteam..
0
37
0
RT @hdmoore: I'm excited to announce our "Out-of-Band" series; focused on the security risks of management devices like BMCs, serial serve….
0
46
0
RT @N7WEra: Sharing mindmap I wrote for active and passive OSINT based on my knowledge and @Jhaddix Bug bounty methodology course. https://….
0
6
0
RT @techspence: How to find insecure delegations in active directory. 1. Download and run ADeleg.2. Click View -> Index view by -> Trustees….
0
60
0
RT @phantomcybersec: The wait is over! Our stealthy Windows persistence technique (PhantomPersist) is now out!. Read the blog post here: ht….
0
84
0
RT @nickvangilder: Red team report recommendations to help reduce risk and impact from SE attacks like those used by Scattered Spider and s….
0
2
0
RT @harshleenchawl2: 2025 Red Team Tools – C2 Frameworks, Active Directory & Network Exploitation.
0
122
0