Soumyadeep Basu Profile
Soumyadeep Basu

@SoumyadeepBas12

Followers
1K
Following
9K
Media
48
Statuses
4K

Security Research | Snooker addict Views/tweets/retweets are my own, doesn't represent my employer

Kolkata West Bengal
Joined August 2019
Don't wanna be here? Send us removal request.
@TwoSevenOneT
Two Seven One Three
12 days
EDR-Redir can successfully run with ESET. I will soon upgrade it to V2 with the ability to "redir" more types of EDRs. 💪 GitHub: TwoSevenOneT/EDR-Redir #antimalware #CyberSecurity
3
34
184
@whiteintel_io
Whiteintel
13 days
Hundreds of leaked EDR credentials are circulating. Because EDRs have deep device access, this is like handing over your C2. This issue doesn’t stem from vulnerabilities in the EDR products themselves, but rather from end users who inadvertently download and execute malware.
4
48
229
@MauroEldritch
Mauro Eldritch 🏴‍☠️
13 days
🇰🇵 Meet "Mateo" and "Alfredo", two young #Lazarus agents who thought it was a good idea to steal someone else's ID and resume to try to get a job with us. 🪶 We recorded them and found interesting data on how they operate. ⬇️ Read our article on the #QuetzalTeam Blog below!
2
117
574
@BushidoToken
Will
13 days
New Blog 👀 This blog discusses the topic of cybercrime counterintelligence to highlight the growing threat toward the cyber threat intelligence (CTI) and law enforcement (LE) communities ⚠️ 🔗 https://t.co/e7XVviZHMm
3
47
178
@blackorbird
blackorbird
23 days
Part two and three of the leaked Charming Kitten(APT35) files reveal operations across five continents https://t.co/JvlEbmoXS9
@blackorbird
blackorbird
1 month
An Insider Look At The APT35 Operations https://t.co/9dUrE4WWh4
0
25
91
@koryodynasty
Raphael Rashid
1 month
1/ My latest for The Diplomat: A China-based hack penetrated deep into S. Korea's government backbone. White hat hackers accidentally discovered it and exposed the breach. But was it really North Korea?
Tweet card summary image
thediplomat.com
White hat hackers exposed a systematic breach of South Korea’s digital backbone, but Seoul remains silent on the crisis.
5
51
145
@GangExposed_RU
GangExposed RU
1 month
Hunting Conti’s Shadow How I found what the FBI, the NSA and an army of researchers couldn't Imagine you’re hunting the most disciplined cybercriminal group in the world — Conti. These guys wrote the textbooks on OPSEC. Impeccable digital hygiene. In 2022, all their internal
@GangExposed_RU
GangExposed RU
2 months
TARGET (CONTI) = Alexey Kurashov (23.02.1986) [Identified] Reward: up to $10M. 👉 Full dossier page, archive and all evidence: https://t.co/WCc8ToIAUT Stylometry, travel, and chat data confirm Kurashov as TARGET/BLOODRUSH. Linked to CONTI core (Professor, Stanton, Stalin,
15
126
687
@fr0gger_
Thomas Roccia 🤘
28 days
My DEFCON talk about cryptomoney laundering techniques is out! At minute 20:30, I demonstrate how I use an AI agent to assist my investigation in money tracking and laundering pattern identification. Then I discuss the limits and possibilities 🤓 https://t.co/oSSOvPi2xB
1
68
258
@whokilleddb
db
1 month
From my talk at @WWHackinFest, presenting ClickForClickOnce: An easy-to-deploy web based application that allows you to create customisable ClickOnce applications which can run shellcode, drop files or run OS commands Repo: https://t.co/tcAJvneHgz Slides: https://t.co/F0vxFSVsEW
3
33
125
@IntCyberDigest
International Cyber Digest
1 month
‼️ Iranian nation-state APT CharmingKitten exposed on GitHub. Exposure includes: - Official APT internal network documents - Employee photos - Attack reports - Translation documents - Internal chat files
5
78
445
@c_APT_ure
TomU | I'm still here... til the end 🕊️🇨🇭
1 month
New blog post and call for collaboration and sharing around "Using NetBIOS names for pivoting and threat clustering" I'm already tracking more than 40 clusters and growing... https://t.co/V7fhoabgAP
8
41
230
@ShitSecure
S3cur3Th1sSh1t
2 months
You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡 1) Create a clone into a new template of the target VM 2) Download the VMDK file of the template from the storage 3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY (1/3)
7
108
490
@TomerNahum1
Tomer Nahum
2 months
Happy to release SAMLSmith together with @ericonidentity - Generate forged SAML responses - Simulate Silver SAML & Golden SAML attacks - Extract usable certificate files from AD FS encrypted materials. The tool is written in C# Check it out here - https://t.co/ZI7h4HhvPK
1
74
236
@OrangeCon_nl
OrangeCon
2 months
For those of you at home, here's your reminder that the conference is being live streamed! ;) Track 1: https://t.co/6s0Az6dDdV Track 2: https://t.co/izc7donS7r
0
19
38
@fr0gger_
Thomas Roccia 🤘
2 months
Interesting tool if you are looking for a complement to strings, stringsifter and floss. StrangerStrings uses a trigram-based scoring model to calculate probabilities of character sequences. 👇 https://t.co/62WH2iOzSD
2
61
207
@fr0gger_
Thomas Roccia 🤘
3 months
🤓 I just published my @AusCERT talk titled “Generative AI Breaches: Threats, Investigations, and Response.” In this presentation, I explain how to protect and investigate AI breaches. Small thread 🧵👇
4
53
194
@_logangoins
Logan Goins
4 months
My first @SpecterOps blog! Ever wanted to collect Active Directory information from LDAP for a Red Team? Using LDAP's more OPSEC-considerate cousin: ADWS can be used to improve upon the already present advantages of using smaller-scaling LDAP queries. https://t.co/6SFxGDpQkL
Tweet card summary image
specterops.io
Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments
1
105
336
@al3x_n3ff
Alex Neff
4 months
Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀
13
170
670
@polygonben
Ben
4 months
Interesting hands-on-keyboard case today @HuntressLabs -> Suspected VPN initial access -> TA used this to RDP to DC & RDS -> TA created a hidden accounts for persistence -> TA attempted to clear logs for defence evasion -> Huntress evicted TA 😎
5
26
174