Will Hunt @[email protected]
@Stealthsploit
Followers
1K
Following
2K
Media
225
Statuses
2K
Hacker, Black Hat trainer, speaker, musician, gamer. Co-founded @insecurity_ltd. https://t.co/T3s2B55WJl Discord - https://t.co/nFzmfIfjxa
Cambridge, UK
Joined August 2014
We've decided to make our #Password Cracking 101+1 #training FREE. 15 vids over 15 weeks starting this Wednesday and a VM so you can follow along and make it rain plains with us. https://t.co/nNbiUuJbQ3
#cyber #cybersecurity #hashcat
in.security
Learn password cracking techniques, how to tailor these to the hashes you have, and more during this free intensive 4-hour training course.
5
79
214
A quick run down on some of the attacks and wordlist augmentation options in Hashcatalyst https://t.co/X9LhpuQbmM
#hashcat #pentest #passwords #redteam
in.security
Let’s set the scene… You’re mid-way through an internal infrastructure assessment. One half of you is wondering why the client’s SOC hadn’t sufficiently detected your pass-the-hash attacks and the...
0
0
0
From Shadows to Signals: Hunting Pass-the-Hash Attacks - https://t.co/2TNEsrCUHk
https://t.co/37rhUQzXdC
#MicrosoftSentinel #Cybersecurity #MicrosoftSecurity #Security #DefenderXDR
in.security
Overview In a lot of threat hunting scenarios it can be very difficult to determine if an activity is attributable to legitimate user input or the result of an attacker’s actions. This is particula...
1
11
39
Check out our recent blog where @rebootuser takes us through some logic for PtH anomaly detection, reducing the noise and false positive rate when identifying this commonly used lateral movement attack https://t.co/2V3f2VlM4p
#threathunting #blueteam #kql #microsoftsentinel
in.security
Overview In a lot of threat hunting scenarios it can be very difficult to determine if an activity is attributable to legitimate user input or the result of an attacker’s actions. This is particula...
0
0
1
Let's go Black Hat Europe 2025! Join https://t.co/sLZ6ePxhbJ to level up your penetration testing or threat hunting skills https://t.co/PhrH5Z9Kcd
#BHEU
app.ingo.me
1
2
5
It's @brucon soon! We're running our 3-day Hacking Enterprises - 2025 Red Edition #training and there's still some places left. After, hope to see you at the conference for talks, games, and possibly even a beer 😉 https://t.co/NXDdDBc20F
#hacking #pentesting #cybersecurity
0
1
2
Want to learn how to phish, embed C2, evade AV, escalate, exfiltrate and persist across trusts?! Of course you do. It’s just a fraction of what’s covered in 3-days of Hacking Enterprises – 2025 Red Edition by @Stealthsploit and @rebootuser at #BruCON0x11. https://t.co/0X86U8TF7a
0
3
5
hashcat v7.1.0 released! This update includes important bug fixes, new features, and support for new hash-modes, including KeePass with Argon2. Read the full write-up here: https://t.co/rg8zfMUt3B
5
48
160
We just finished the Jabbercracky password contest at DEFCON 33! Check out our writeup on using the new Python Bridge in hashcat 7 for rapid prototyping a solution to an unsupported hash mode: https://t.co/HG3o80bAbt
0
18
89
Team Hashcat took first place in the Jabbercracky contest at #DEFCON33! Thanks to HashMob for putting up a great fight and congrats on 2nd place! We're looking forward to your write-up! Huge thanks to Jabbercracky, @Stealthsploit, and @PasswordVillage for organizing!
5
37
234
@Stealthsploit is another of my personal must-see speakers, I'm so chuffed he's coming to Leeds
🎉 Speaker Announcement — Will Hunt 🎉 We're excited that @Stealthsploit will be at BSides Leeds to present 'Plundering and pillaging passwords'. Catch Will's talk at 11:50 on the 21st!
0
1
3
Tomorrow at 12pm PDT the #DEFCON Jabbercracky CTF begins at @PasswordVillage. Practice your password cracking-fu in the casual league or clash with the pros in the advanced league. See you all on the leaderboard. Still time to sign up! https://t.co/HCq9gKg7f9
#hashcat
0
3
7
Badge collected, checked our training rooms out. Let’s bring it on. Excited for tomorrow! @BlackHatEvents #BHUSA
0
2
9
hashcat v7.0.0 released! After nearly 3 years of development and over 900,000 lines of code changed, this is easily the largest release we have ever had. Detailed writeup is available here: https://t.co/fxAIXNXsEr
22
375
1K
Not long to go until @BlackHatEvents USA! Whether attacking or defending, we've got you covered💪Check out our Hacking Enterprises, and Defending Enterprises training https://t.co/LppNsJ1gwU
#pentest #redteam #hacking #threathunting #blueteam #kql #microsoftsentinel
0
0
1
Thanks to Jabbercracky for helping run the event
0
0
1
As CMIYC unfortunately isn't running at @defcon this year, @PasswordVillage has teamed up with @insecurity_ltd to bring you the DEFCON Jabbercracky! Team or solo, easy and pro lists. 48 hours starting midday 8/8. Register now
1
2
2