PyroTek3 Profile Banner
Sean Metcalf Profile
Sean Metcalf

@PyroTek3

Followers
35K
Following
41K
Media
2K
Statuses
21K

Identity Security Architect @ TrustedSec. Microsoft Certified Master #ActiveDirectory & former Microsoft MVP. He/Him. #BLM

4°08'15.0N 162°03'42.0E
Joined August 2014
Don't wanna be here? Send us removal request.
@PyroTek3
Sean Metcalf
5 years
To my black family, friends, and people seeing this:. I love you.You matter.I'm here for you. #BlackLivesMatter.
4
3
124
@PyroTek3
Sean Metcalf
14 hours
RT @sekurlsa_pw: Reminder that you can try to crack NTLMv1 hashes to get the NTLM with .from @Evil_Mog.
0
8
0
@PyroTek3
Sean Metcalf
15 hours
RT @techspence: Internal pentest findings that shouldn't exist in 2025. - credentials on file shares/sharepoint/dms.- local admin passwo….
0
54
0
@PyroTek3
Sean Metcalf
15 hours
From a recent Active Directory Security Assessment (ADSA) I did:. * AD admin accounts with passwords older than 5 years (likely Kerberoastable). * Group Policy Objects (GPOs) linked to the Domain root with modify rights delegated to non-AD admins. * Service accounts with really.
@techspence
spencer
19 hours
Internal pentest findings that shouldn't exist in 2025. - credentials on file shares/sharepoint/dms.- local admin password reuse.- kerberoastable domain admins.- ADCS Misconfigs.- spooler running on DCs.- lack of powershell restrictions.- EDR missing on hosts.
6
36
195
@PyroTek3
Sean Metcalf
15 hours
RT @_devonkerr_: Should anyone need to get ahold of me about @elasticseclabs research, DMs are open and I just had lunch so I’m feeling hos….
0
5
0
@PyroTek3
Sean Metcalf
15 hours
RT @HackingLZ: Bump.
0
12
0
@PyroTek3
Sean Metcalf
16 hours
RT @BSides_NoVA: BSides Northern Virginia is bigger than ever for 2025, with 1,000+ attendees expected and multiple tracks covering the cut….
0
4
0
@PyroTek3
Sean Metcalf
16 hours
RT @techspence: Instead of giving Domain Users FullControl over file shares, create security groups for specific groups of users for specif….
0
12
0
@PyroTek3
Sean Metcalf
16 hours
RT @IAMERICAbooted: For anyone stuck on how to implement sites.selected API permissions with powershell graph instead of PnP powershell, th….
0
3
0
@PyroTek3
Sean Metcalf
16 hours
RT @_sigil: ☁️ My fwd:cloudsec talk, "I SPy: Rethinking Entra ID research for new paths to Global Admin", is up! Learn what a service princ….
0
26
0
@PyroTek3
Sean Metcalf
17 hours
RT @BlackInCyberCo1: 4️⃣ Watch the 4th year of our village journey!⁠ 🌠.⁠.⁠.#AlaafiaState #BlacksInCyber #BICVillage….
0
2
0
@PyroTek3
Sean Metcalf
17 hours
Tweet media one
0
1
0
@PyroTek3
Sean Metcalf
17 hours
RT @bettersafetynet: Helpdesk and other frontline support folks,. If your first response is "it works on my system". You're not helping. S….
0
7
0
@PyroTek3
Sean Metcalf
2 days
RT @jamieantisocial: this part.
Tweet media one
0
20
0
@PyroTek3
Sean Metcalf
2 days
RT @UnknownBinary: The Darknet Diaries episode with @Laughing_Mantis is one of my favorites. Growing up poor along with other forms of adve….
0
1
0
@PyroTek3
Sean Metcalf
2 days
RT @HackingLZ: They need an internal team dedicated to removing hardcoded creds/keys across their entire product line. .
0
9
0
@PyroTek3
Sean Metcalf
2 days
RT @TrustedSec: The season finale of #SecurityNoise is out now! Hear what @cantcomputer and @ustayready have to say about their hacker root….
0
14
0
@PyroTek3
Sean Metcalf
2 days
RT @arekfurt: It's fine & good to worry about relaying and other protocol-based attacks in Active Directory. But remember that by far the m….
0
1
0
@PyroTek3
Sean Metcalf
2 days
RT @SamErde: The Microsoft Entra PowerShell module has been updated to 1.0.9 with fixes for several functions. 🧑‍💻 Have you replaced your A….
0
5
0
@PyroTek3
Sean Metcalf
2 days
RT @SwiftOnSecurity: Especially on clients – unless you're doing something stupid, there should be almost no events. If you see events on c….
0
14
0
@PyroTek3
Sean Metcalf
2 days
RT @jeffmcjunkin: Anyone using Kubernetes at your company? You should strongly consider this class, if so. Jay does a fantastic job outlini….
0
6
0