Security_Aware1 Profile Banner
RedHeadSec Profile
RedHeadSec

@Security_Aware1

Followers
62
Following
437
Media
15
Statuses
121

Just on here to follow security shit. Attack & Penetration Consultant, OSCP/GCIA/CRTO/CRTL Holder @[email protected]

Texas, USA
Joined April 2018
Don't wanna be here? Send us removal request.
@Tyl0us
Matt Eidelberg
1 year
This… this right here is what defines an amazing leader of great company. Hats off to you @Atredis, you continue to impress me.
@tweathers_sec
Travis Weathers
1 year
@Atredis coming over the top!!! LFG!! #HelpJoeyBelans #InfoSec
0
1
10
@lazzslayer
lazzslayer
1 year
Joining Optiv back in 2020, Joey Belans was a huge mentor for me and helped me grow a TON. I will always be grateful for his kindness. Joey was let go today from Optiv just before starting FMLA, and his family could really use support. https://t.co/YkmC1Eug0k
Tweet card summary image
gofundme.com
Update: Thanks to this community's incredible efforts, we applied enough … Travis Weathers needs your support for Help Joey Belans: Facing Cancer After Layoff
11
33
90
@unsigned_sh0rt
Garrett
1 year
Joey is such a good dude. First time I met him the guy was all smiles and good vibes. You'd haver never known what he was fighting internally. It's pretty unfortunate this situation and he and his family could really use some support right now. Please share for reach.
0
4
15
@SpecterOps
SpecterOps
2 years
Home labs are one of the best tools for researchers & testers. @synzack21 shares a fully customizable #SCCM deployment that you can integrate into your home lab, creating a space for you to recreate SCCM research & probe for vulnerabilities. Read more! ⬇️
Tweet card summary image
specterops.io
Learn how to automate SCCM deployment with Ludus, creating a fully integrated and personalized lab environment for hands-on research and testing.
0
30
73
@unsigned_sh0rt
Garrett
2 years
Merged! Thanks again @s1zzzz for the awesome work for the new DPAPI module in SCCMHunter. https://t.co/0eGqnPoBzr
@s1zzzz
s1zz
2 years
MachineAccountQuota = 0, preventing you from grabbing NAA creds remotely? DPAPI to the rescue! Ported over NAA Extraction via DPAPI to sccmhunter. h/t: @agsolino & @clavoillotte for https://t.co/uLXWJvJm3E
4
62
233
@Tyl0us
Matt Eidelberg
2 years
Long overdue but SourcePoint v3.0 is out now, with a ton of new features and bug fixes. With these changes, Initial access and Post-Ex activities with CobaltStrike can fly under the radar. Check it out https://t.co/RRqfMbS503 ! #redteam #netsec
1
73
181
@unsigned_sh0rt
Garrett
2 years
Nice my talk was accepted! Excited to be coming back to @BSidesPDX to talk about SCCM and SCCMHunter v2
4
8
38
@unsigned_sh0rt
Garrett
2 years
SCCM Site takeover by abusing the AdminService API. In this blog, I walkthrough the discovery process and demonstrate site takeover via credential relaying. https://t.co/pulvsxqbtA
Tweet card summary image
specterops.io
While researching SCCM services, I was studying the various access methods to retrieve or modify data stored in a SCCM site’s database. Read more...
4
146
295
@unsigned_sh0rt
Garrett
3 years
Sharing a tool I wrote to streamline attacking SCCM. Some features include profiling target servers for admin smb relay attacks, site server takeover, http enrollment, and leveraging the adminservice api. https://t.co/aiJzWIJNDR
Tweet card summary image
github.com
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. - GitHub - garrettfoster13/sccmhunter: SCCMHunter is a pos...
2
118
268
@Tyl0us
Matt Eidelberg
3 years
New Tool - https://t.co/iCtru1F5d2 is a payload toolkit for bypassing EDRs using suspended processes, and direct syscalls written in RUST. Check it out: https://t.co/nd18QZW4AD #netsec #redteam #EDR #evasion #rustlang
Tweet card summary image
github.com
Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST - optiv/Freeze.rs
7
175
477
@Tyl0us
Matt Eidelberg
3 years
ScareCrow 5.0 is out now, a massive rewrite of the framework with huge new features, IoC's removed & new evasion techniques added. If you are curious take a look at the changelog. Check it out: https://t.co/VIQVnKd2tJ #netsec #redteam #EDR #evasion
Tweet card summary image
github.com
ScareCrow - Payload creation framework designed around EDR bypass. - optiv/ScareCrow
5
188
470
@icyguider
icyguider
3 years
SysWhispers3 has been added to Shhhloader! 😎 It should work with all current shellcode injection techniques. Some bug fixes also make this the most stable version yet. More updates to come, and thanks to @KlezVirus for SW3.
Tweet card summary image
github.com
Syscall Shellcode Loader (Work in Progress). Contribute to icyguider/Shhhloader development by creating an account on GitHub.
1
54
170
@Tyl0us
Matt Eidelberg
3 years
I've had so much fun learning rust. This is an excellent example of the power of rust, no EDR unhooking, patching of ETW, syscalls, or LITCRYPT and it calls home against EDRs. More to come soon #redteam
21
78
538
@semenov_roman_
Roman Semenov 🌪️
3 years
The new jailbreak is so fun
554
6K
35K
@Octoberfest73
Octoberfest7
3 years
I’m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exe’s in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1 #redteam #cybersecurity #malware
Tweet card summary image
github.com
Execute unmanaged Windows executables in CobaltStrike Beacons - GitHub - Octoberfest7/Inline-Execute-PE: Execute unmanaged Windows executables in CobaltStrike Beacons
4
173
397
@Tyl0us
Matt Eidelberg
3 years
Talon 3.1 is out today with some new features around password lock-out controls and other bug fixes. Big shoutout to ZerkerEOD for all the hard work. #netsec #redteam https://t.co/LeuW3jgoDR
Tweet card summary image
github.com
A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment. - optiv/Talon
0
15
28
@Security_Aware1
RedHeadSec
3 years
Compatibility to Compromise Evasive Ginger https://t.co/6NkksXVFDv
0
3
2
@Security_Aware1
RedHeadSec
3 years
Red Team Operator 2 Review Evasive Ginger https://t.co/i1TPEvClZm
0
0
1
@_JohnHammond
John Hammond
3 years
Don't forget, 0-days wouldn't happen if you had just bought that one vendor's EDR, MDR, XDR, NDR, RDR, NXDR, ODR, PDR, LDR, QDR, VDR, JDR, KDR, IDR, 1DR, 4DR, DDR, ZDR, YDR, ⧫DR, 🟋DR, 🙻DRR, DRDRDR, AIDR solutions they emailed you about after you got stickers from their booth.
67
168
1K