_RastaMouse Profile Banner
Rasta Mouse Profile
Rasta Mouse

@_RastaMouse

Followers
47K
Following
7K
Media
2K
Statuses
20K

Be kind, be brave, be principled.

Joined January 2012
Don't wanna be here? Send us removal request.
@decoder_it
Andrea P
17 hours
Brand-new admin protection bypasses by @tiraniddo As usual, awesome work! 💪💪💪 https://t.co/PysmzK9XFL  and
0
21
67
@_RastaMouse
Rasta Mouse
2 days
Postex PICOs <3
0
0
5
@_RastaMouse
Rasta Mouse
2 days
I'm basically Warren Buffett right now
3
0
38
@_RastaMouse
Rasta Mouse
3 days
Looks like me tbf
@hackthebox_eu
Hack The Box
3 days
Our designers are on leave… but our discounts aren’t 🔥 Hack smarter, not pricier — get 25% OFF the annual HTB Pro Labs subscription. Access 26 different scenarios (with many more coming by the beginning of next year), built to train you for real-world, enterprise environments.
2
1
37
@_RastaMouse
Rasta Mouse
4 days
Jumping on the bandwagon
3
1
41
@0xBoku
Bobby Cooke
7 days
Venom C2 tool drop! 🐍 During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. Some had EDR so we didn't want anything off-the-shelf. The server, agent, and client were made
10
90
418
@DebugPrivilege
DebugPrivilege
8 days
As a fun side project - I’ve started tracking vendors whose guides ask customers to create ESC1-style certificate templates, leaving an entire environment exposed 😅
Tweet card summary image
medium.com
This post isn’t about vendor-bashing. With attacks against Active Directory Certificate Services (ADCS) increasing, I want to show how…
5
39
139
@_RastaMouse
Rasta Mouse
8 days
I spent some time today (ok, the whole day), trying to find a way to bypass PPID spoofing detections. I failed miserably.
5
1
51
@saerxcit
SAERXCIT
9 days
First blogpost in a while, check it out! PoC is a Crystal Palace shared library, format inspired by @_RastaMouse's LibTP https://t.co/7nGj4OyGrZ
@AlmondOffSec
Almond OffSec
9 days
Callstacks are largely used by the Elastic EDR to detect malicious activity. @SAERXCIT details a technique to evade a callstack-based detection and allow shellcode to load a network module without getting detected. Post: https://t.co/hckL3n8it5 PoC: https://t.co/0dqBDQeKWm
0
20
83
@rad9800
Rad
11 days
I spent years bypassing security tools as a red teamer. So I built the product to catch me. Launching Nov. 10th.
@deceptiq_
deceptiq
11 days
We are Red Teamers. We know the problem. Here's how we fix It. Launching November 10th. https://t.co/qBgCurNlXo
10
22
278
@hackthebox_eu
Hack The Box
10 days
A new milestone for Hack The Box 🚀 We’re joining forces with LinkedIn Learning, becoming their first-ever cybersecurity training labs partner. Together, we’re reshaping how the world learns cybersecurity, making hands-on, performance-based skill development accessible to
5
17
201
@Flangvik
Melvin langvik
13 days
I felt another MythicC2 demo and showcase was in order, showing off both the new Forge collection utility, but also my Apollo fork with HTTPx Malleable Profile support. Video is out now (link in comments)
5
31
112
@xCipher007
Cipher007
13 days
My first blog!!!!! https://t.co/LnsWqOf2us
rohannk.com
The EDR Wall
5
34
196
@RtlDallas
Rtl Dallas
14 days
Released my Cobalt Strike BOF for fork & run injection! Features Draugr stack spoofing, PPID spoofing, multiple execution methods, and indirect syscalls for enhanced OpSec. https://t.co/kfiAcfLSaY
6
74
279
@PyroTek3
Sean Metcalf
16 days
The KB5067036 update is now available on Windows 11 computers running 24H2 &25H2 and includes the Administrator Protection feature. This feature leverages Windows Hello (PIN or biometric) for administrator actions and uses a temporary token which is destroyed after use. This
4
76
296
@_RastaMouse
Rasta Mouse
15 days
My annual contribution to the small boats and migrant hotels...
5
0
34
@_RastaMouse
Rasta Mouse
16 days
The most 1337 AMSI bypass for the CLR ever.
4
39
348
@_RastaMouse
Rasta Mouse
17 days
I've also updated Crystal Loaders to benefit from some of the new CP features
Tweet card summary image
github.com
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike - rasta-mouse/Crystal-Loaders
0
3
23
@_RastaMouse
Rasta Mouse
17 days
LibGate - a Crystal Palace shared library for resolving and performing syscalls
Tweet card summary image
github.com
A Crystal Palace shared library to resolve & perform syscalls - rasta-mouse/LibGate
3
19
108