
Nde
@YourNextCISO
Followers
394
Following
13K
Media
173
Statuses
2K
SOC Analyst || 💙 Blue Team journey || #cybersecurity👨🏿‍💻
Douala, Cameroon.
Joined November 2022
RT @ireteeh: We launched CyBlack SOC Academy last year, and we are proud to share that we have recorded 18 jobs so far. Application for t….
0
91
0
RT @TisforTolu: Cybersecurity is broad. Before you start thinking “ethical hacker” or “SOC analyst,” pause. The real first step? Underst….
0
274
0
RT @Cyb3rMonk: 🚨Bad news for defenders, good news for red teamers:.Linkable token identifiers in Entra ID are useful only in an AiTM scenar….
0
19
0
RT @T3chFalcon: Scheduled Task Persistence via SharpPersist + Cobalt Strike. Runs a Base64-encoded PowerShell payload.Executes hourly via….
0
31
0
RT @I_Am_Jakoby: Added a new tool to:. ⚠️Please Use Responsibly⚠️. You can use this to instantly generate an obfusc….
0
411
0
RT @T3chFalcon: Everyone knows certutil.exe. But certreq.exe?. Native to Windows.Signed by Microsoft.HTTP POST support.Can exfil small file….
lolbas-project.github.io
CertReq.exe is a living-of-the-land file containing unexpected functionality that can be abused by attackers; this page lists all its use cases.
0
64
0
RT @T3chFalcon: Decrypting Edge Browser Passwords. Modern Edge/Chrome encrypt saved logins with AES-GCM. Step 1: Extract AES key from the….
0
48
0
RT @bluecapesec: 🔷 Want to learn real Windows forensics?.Join our live walkthrough of a real-world compromise + see what a structured fore….
0
2
0
RT @OtterHacker: Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb !. Evilginx is really….
0
53
0
RT @Dghost_Ninja: Hi @hackSultan . My name is Samuel. A cybersecurity enthusiast specialized in Application Security Engineering and Penetr….
0
63
0
RT @Dghost_Ninja: Really need a role for real. If you've an opening or your organization is hiring, please just reach out. So tired of this….
0
20
0
RT @inversecos: Become a contributor at XINTRA @XintraOrg 🔎. We're looking for RED and BLUE team contributors . 🔴Red Team – Emulate real AP….
0
20
0
RT @mathias_fuchs: 🕵️‍♂️ How do attackers ghost past your EDR?. New blog post dives deep into evasion tricks—LOLBins, memory games, syscall….
medium.com
Endpoint Detection and Response (EDR) solutions are the cyber sentinels on our endpoints — vigilant guards that monitor system behavior…
0
3
0
RT @mathias_fuchs: 🗓 Logs lie. Prefetch tattles. ShimCache whispers. Timestamps dance. Building timelines in DFIR isn’t just science—it’s….
medium.com
Building a coherent DFIR timeline can feel like wrangling the Greek god of time (Chronos) while fending off complete chaos. Timelines are…
0
5
0
RT @inversecos: Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿. (i….
0
321
0