_Mayyhem Profile Banner
Chris Thompson Profile
Chris Thompson

@_Mayyhem

Followers
3K
Following
2K
Media
15
Statuses
467

Senior Security Researcher @SpecterOps https://t.co/Sz5fRYkX6u

Joined August 2015
Don't wanna be here? Send us removal request.
@_Mayyhem
Chris Thompson
3 months
I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - https://t.co/Hh089SaVOS - https://t.co/geO0HXTykf
6
215
628
@JimSycurity
Jim Sykora
7 days
AdminSDHolder is kinda my jam. I wrote the e-book on it. If you work with Activity Directory, I highly recommend you give this a skim, or at least check the spoilers in the blog.
@SpecterOps
SpecterOps
8 days
AdminSDHolder: the AD security feature everyone thinks they understand but probably don't. 😬 @JimSycurity went to the source code to debunk decades of misconceptions — including ones in Microsoft's own docs. Read more ⤵️ https://t.co/Vo9XksEfmn
2
34
193
@0xr0BIT
r0BIT
5 days
This is (probably) the last time I‘ll nag you with TaskHound. Since my org doesn’t allow me to use memes in our official blogs I finally took the hint and stopped procrastinating. My personal Blog is now live :). https://t.co/Sp2aj2Y0EO (Disclaimer: may contain sarcasm and memes)
2
21
84
@podalirius_
Rémi GASCOU (Podalirius)
9 days
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
Tweet card summary image
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
3
91
219
@SpecterOps
SpecterOps
1 month
The only conference dedicated to Attack Path Management is back! 3 tracks. Real-world case studies. Hands-on BloodHound Quest lab. Join us at #SOCON2026 and advance your identity-first security strategy. 🎟️ Save 25% with early bird: https://t.co/0njiU2f3ac
0
5
19
@SpecterOps
SpecterOps
24 days
Microsoft introduced nested application auth (NAA) in 2024. Researchers spotted FOCI similarities & dubbed it brokered client IDs (BroCI). @Icemoonhsv documents NAA flows and BroCI—filling a gap for research on Microsoft identity protocols.
Tweet card summary image
specterops.io
This writeup is a summary of knowledge and resources for nested application authentication (NAA) and brokered client IDs (BroCI)
1
20
49
@hdmoore
HD Moore
12 days
Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: https://t.co/YIbFZiSb6A
5
133
596
@SpecterOps
SpecterOps
16 days
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
309
651
@SpecterOps
SpecterOps
18 days
SCCM is one of the most relied-on enterprise tools, but that legacy comes with risk. Join @unsigned_sh0rt this Friday at #BSidesPDX as he discusses how attackers can abuse #SCCM Entra integrations to gain admin access. ➡️ https://t.co/7UiihoC0kA
0
12
44
@decoder_it
Andrea P
18 days
Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used. Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
4
86
282
@_dirkjan
Dirk-jan
2 months
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
143
906
3K
@0xthirteen
Steven
3 months
I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
1
59
122
@SpecterOps
SpecterOps
3 months
Why should Microsoft's Nested App Authentication (NAA) should be on your security team's radar? @Icemoonhsv breaks down NAA and shows how attackers can pivot between Azure resources using brokered authentication.
Tweet card summary image
specterops.io
In depth walkthrough for using nested app authentication (NAA), or BroCI, for offensive engagements to access information and resources.
0
21
64
@SpecterOps
SpecterOps
3 months
The AD CS security landscape keeps evolving, and so does our tooling. 🛠️ @bytewreck drops info on Certify 2.0, including a suite of new capabilities and refined usability improvements.
Tweet card summary image
specterops.io
Certify 2.0 features a suite of new capabilities and usability enhancements. This blogpost introduces changes and features additions.
0
99
237
@SpecterOps
SpecterOps
3 months
PDQ SmartDeploy versions prior to 3.0.2046 used static, hardcoded encryption keys for cred storage. Low-privileged users could potentially access admin creds from registry or deployment files. @unsigned_sh0rt unpacks his testing in his latest blog post.
Tweet card summary image
specterops.io
TL;DR: Prior to version 3.0.2046, PDQ SmartDeploy used static, hardcoded, and universal encryption keys for secure credential storage. Low-privileged users may recover and decrypt privileged creden...
2
52
128
@unsigned_sh0rt
Garrett
3 months
WSFC misconfigurations can turn your domain into one big fustercluck. I'm sharing fustercluck today as part of my #BHUSA presentation. The README summarizes the issues and a detailed blog is coming soon.
Tweet card summary image
github.com
POC tool to abuse windows server failover clusters - garrettfoster13/fustercluck
4
51
115
@SpecterOps
SpecterOps
3 months
What all do you need to know about BloodHound CE 8.0 & OpenGraph? @ScoubiMtl is joining @RedSiege's Wednesday Offensive tomorrow to dive into the JSON schema for OpenGraph, how to ingest nodes & edges, best practices, & how to create custom icons. Join 👉 https://t.co/5LN1l2r5mZ
1
7
18
@m0rd4vid
MOR DAVID
3 months
Dear fellow pentesters & red teamers, How often do you run into a vCenter in your client’s environment? 🖥️ I just built one for vCenter - meet vCenterHound 🐾😉 This is just the beginning… more collectors and surprises are on the way. #Pentesting #RedTeam #BloodHound #vCenter
1
38
157
@unsigned_sh0rt
Garrett
3 months
I pushed updates to SCCMHunter as part of my Arsenal demo at #BHUSA today! New features include a relay module for TAKEOVER-5 and a community contribution to coerce client push from a *nix host for ELEVATE-2. https://t.co/INtQRq6bdI.
Tweet card summary image
github.com
[1.1.10] - 2025-08-06 Added Relay Module Added a new module to support TAKEOVER-5. Operators can relay coerced authentication to the SMS Provider role to compromise SCCM. HTTP Module Thanks ...
1
52
137
@_Mayyhem
Chris Thompson
3 months
This post about MSSQLHound, a PowerShell collector that adds 7 new nodes and 37 new edges to BloodHound, details my experience and lessons learned designing and implementing the tool using OpenGraph and provides examples of how to research and discover MSSQL attack paths.
@SpecterOps
SpecterOps
3 months
MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases. @_Mayyhem unpacks this new feature in his blog post. 👇
0
30
94
@_Mayyhem
Chris Thompson
3 months
Want to add your own new nodes and edges to BloodHound with OpenGraph and wondering where to start with your design? This post is a must read. Andy does an excellent job explaining the concepts and patterns you can follow to create reliable attack path graphs every time.
@_wald0
Andy Robbins
3 months
In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound:
0
2
3