RedHeadSec
@Security_Aware1
Followers
62
Following
437
Media
15
Statuses
121
Just on here to follow security shit. Attack & Penetration Consultant, OSCP/GCIA/CRTO/CRTL Holder @[email protected]
Texas, USA
Joined April 2018
This… this right here is what defines an amazing leader of great company. Hats off to you @Atredis, you continue to impress me.
0
1
10
Joining Optiv back in 2020, Joey Belans was a huge mentor for me and helped me grow a TON. I will always be grateful for his kindness. Joey was let go today from Optiv just before starting FMLA, and his family could really use support. https://t.co/YkmC1Eug0k
gofundme.com
Update: Thanks to this community's incredible efforts, we applied enough … Travis Weathers needs your support for Help Joey Belans: Facing Cancer After Layoff
11
33
90
Joey is such a good dude. First time I met him the guy was all smiles and good vibes. You'd haver never known what he was fighting internally. It's pretty unfortunate this situation and he and his family could really use some support right now. Please share for reach.
0
4
15
Home labs are one of the best tools for researchers & testers. @synzack21 shares a fully customizable #SCCM deployment that you can integrate into your home lab, creating a space for you to recreate SCCM research & probe for vulnerabilities. Read more! ⬇️
specterops.io
Learn how to automate SCCM deployment with Ludus, creating a fully integrated and personalized lab environment for hands-on research and testing.
0
30
73
Merged! Thanks again @s1zzzz for the awesome work for the new DPAPI module in SCCMHunter. https://t.co/0eGqnPoBzr
MachineAccountQuota = 0, preventing you from grabbing NAA creds remotely? DPAPI to the rescue! Ported over NAA Extraction via DPAPI to sccmhunter. h/t: @agsolino & @clavoillotte for https://t.co/uLXWJvJm3E
4
62
233
Long overdue but SourcePoint v3.0 is out now, with a ton of new features and bug fixes. With these changes, Initial access and Post-Ex activities with CobaltStrike can fly under the radar. Check it out https://t.co/RRqfMbS503 ! #redteam #netsec
1
73
181
Nice my talk was accepted! Excited to be coming back to @BSidesPDX to talk about SCCM and SCCMHunter v2
4
8
38
SCCM Site takeover by abusing the AdminService API. In this blog, I walkthrough the discovery process and demonstrate site takeover via credential relaying. https://t.co/pulvsxqbtA
specterops.io
While researching SCCM services, I was studying the various access methods to retrieve or modify data stored in a SCCM site’s database. Read more...
4
146
295
Sharing a tool I wrote to streamline attacking SCCM. Some features include profiling target servers for admin smb relay attacks, site server takeover, http enrollment, and leveraging the adminservice api. https://t.co/aiJzWIJNDR
github.com
SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain. - GitHub - garrettfoster13/sccmhunter: SCCMHunter is a pos...
2
118
268
New Tool - https://t.co/iCtru1F5d2 is a payload toolkit for bypassing EDRs using suspended processes, and direct syscalls written in RUST. Check it out: https://t.co/nd18QZW4AD
#netsec #redteam #EDR #evasion #rustlang
github.com
Freeze.rs is a payload toolkit for bypassing EDRs using suspended processes, direct syscalls written in RUST - optiv/Freeze.rs
7
175
477
ScareCrow 5.0 is out now, a massive rewrite of the framework with huge new features, IoC's removed & new evasion techniques added. If you are curious take a look at the changelog. Check it out: https://t.co/VIQVnKd2tJ
#netsec #redteam #EDR #evasion
github.com
ScareCrow - Payload creation framework designed around EDR bypass. - optiv/ScareCrow
5
188
470
SysWhispers3 has been added to Shhhloader! 😎 It should work with all current shellcode injection techniques. Some bug fixes also make this the most stable version yet. More updates to come, and thanks to @KlezVirus for SW3.
github.com
Syscall Shellcode Loader (Work in Progress). Contribute to icyguider/Shhhloader development by creating an account on GitHub.
1
54
170
I’m pleased to release Inline-Execute-PE, a CobaltStrike toolkit enabling users to load and repeatedly run unmanaged Windows exe’s in Beacon memory without dropping to disk or creating a new process each time. https://t.co/1byTo7uCV1
#redteam #cybersecurity #malware
github.com
Execute unmanaged Windows executables in CobaltStrike Beacons - GitHub - Octoberfest7/Inline-Execute-PE: Execute unmanaged Windows executables in CobaltStrike Beacons
4
173
397
Talon 3.1 is out today with some new features around password lock-out controls and other bug fixes. Big shoutout to ZerkerEOD for all the hard work. #netsec #redteam
https://t.co/LeuW3jgoDR
github.com
A password guessing tool that targets the Kerberos and LDAP services within the Windows Active Directory environment. - optiv/Talon
0
15
28
Don't forget, 0-days wouldn't happen if you had just bought that one vendor's EDR, MDR, XDR, NDR, RDR, NXDR, ODR, PDR, LDR, QDR, VDR, JDR, KDR, IDR, 1DR, 4DR, DDR, ZDR, YDR, ⧫DR, 🟋DR, 🙻DRR, DRDRDR, AIDR solutions they emailed you about after you got stickers from their booth.
67
168
1K