_Mayyhem Profile Banner
Chris Thompson Profile
Chris Thompson

@_Mayyhem

Followers
2K
Following
2K
Media
14
Statuses
431

Senior Security Researcher @SpecterOps https://t.co/Sz5fRYkX6u

Joined August 2015
Don't wanna be here? Send us removal request.
@_Mayyhem
Chris Thompson
8 months
Want to move laterally from C2 on an Intune admin's workstation to any Intune-enrolled device? Check out Maestro (, a new(ish) tool I wrote for those situations, and this blog post to walk you through how:
6
129
299
@_Mayyhem
Chris Thompson
5 days
RT @subat0mik: Thanks to everyone who attended our (@unsigned_sh0rt) talk at @WEareTROOPERS! Here is the companion blog post: https://t.c….
0
22
0
@_Mayyhem
Chris Thompson
20 days
RT @HackAndDo: I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machin….
0
101
0
@_Mayyhem
Chris Thompson
25 days
RT @_xpn_: So excited to see this one come out! Awesome post from @n0pe_sled on why IdP's should still be scrutinized! (tl;dr: OneLogin le….
0
46
0
@_Mayyhem
Chris Thompson
1 month
RT @SpecterOps: BadSuccessor is a new AD attack primitive that abuses dMSAs, allowing an attacker who can modify or create a dMSA to escala….
0
105
0
@_Mayyhem
Chris Thompson
1 month
RT @_logangoins: I'm super happy to announce an operationally weaponized version of @YuG0rd's BadSuccessor in .NET format! With a minimum o….
0
168
0
@_Mayyhem
Chris Thompson
2 months
RT @Oddvarmoe: Your #MDT shares might be spilling secrets like a drunk uncle at a wedding. 🍷💬. In my latest post for @TrustedSec, I dig int….
0
33
0
@_Mayyhem
Chris Thompson
2 months
RT @YuG0rd: 🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability.It allows….
0
371
0
@_Mayyhem
Chris Thompson
2 months
The video of @unsigned_sh0rt's and my talk at @SpecterOps's SO-CON with step-by-step guidance on how to mitigate SCCM hierarchy takeover and credential theft attacks is up!. Video: Slides: More info:
0
10
45
@_Mayyhem
Chris Thompson
2 months
RT @_logangoins: I jumped heavily into learning about SCCM tradecraft and wrote a detailed write-up with custom examples, covering the most….
0
132
0
@_Mayyhem
Chris Thompson
3 months
RT @unsigned_sh0rt: Had some fun with PDQ deploy/inventory credential decryption and wrote about it here: thanks to….
0
44
0
@_Mayyhem
Chris Thompson
3 months
RT @SpecterOps: Think NTLM relay is a solved problem? Think again. Relay attacks are more complicated than many people realize. Check out….
0
95
0
@_Mayyhem
Chris Thompson
3 months
RT @SpecterOps: New blog post just dropped! 🙌. Read the latest from @Tw1sm on how an operator can perform situational awareness steps prior….
0
50
0
@_Mayyhem
Chris Thompson
3 months
Had a great time speaking with @unsigned_sh0rt about SCCM attack path prevention at SO-CON yesterday! Our slides with step-by-step instructions for mitigating the most critical SCCM attacks in your environment are at
@SpecterOps
SpecterOps
3 months
Join @_Mayyhem & @unsigned_sh0rt as their talk gets underway at #SOCON2025! They are demonstrating common misconfiguration abuses & attack paths in SCCM along with a step-by-step remediation guidance.
Tweet media one
0
24
71
@_Mayyhem
Chris Thompson
3 months
I'm excited that my first PRs to BloodHound/SharpHound are now in main! They remove FPs for Owns/WriteOwner edges when implicit owner rights are blocked and add OwnsLimitedRights and WriteOwnerLimitedRights edges when ACEs grant permissions to the OWNER RIGHTS SID. More to come!.
@SpecterOps
SpecterOps
3 months
Accurately see what permissions are exploitable in your AD environment. @_Mayyhem discusses a recent update in BloodHound that shows fewer false positives for Owns/WriteOwner edges, & introduces the new Owns/WriteOwnerLimitedRights edges. ⬇️
1
17
78
@_Mayyhem
Chris Thompson
4 months
RT @unsigned_sh0rt: Along with this blog, I published an update to SCCMHunter that enables credential recovery all from the admin module. N….
0
55
0
@_Mayyhem
Chris Thompson
4 months
Btw I misread the deadline for the SO-CON raffle (which has passed) earlier🤦‍♂️so deleted the original post but just confirmed that we still have t-shirts!.
0
0
0
@_Mayyhem
Chris Thompson
4 months
Still using FOSS/Legacy BloodHound for a specific use case or feature? This survey is a great opportunity to share feedback and what matters to you most when using BloodHound CE with the dev team and snag a free t-shirt while you're at it!
@SpecterOps
SpecterOps
5 months
How does your org use #AttackPathManagement? We want to know!. Take our survey to get a free BloodHound T-shirt and also enter to win a free ticket to #SOCON2025. The deadline to be entered to win the SO-CON pass is Thursday, Feb. 6 at 11:59 PT.
1
4
15
@_Mayyhem
Chris Thompson
4 months
RT @unsigned_sh0rt: Thanks to @synacktiv's recent posts about Kerberos and recent PR's @_dirkjan 's .
0
29
0
@_Mayyhem
Chris Thompson
5 months
Found a .NET method on SCCM site servers that can be called to decrypt secrets stored in the site DB a while back with @unsigned_sh0rt and @tifkin_. Another alternative to @gentilkiwi's mimikatz misc::sccm, @_xpn_'s C# gist, and @sanjivkawa's SQLRecon.
0
61
173