_dru1d Profile Banner
dru1d Profile
dru1d

@_dru1d

Followers
932
Following
15K
Media
134
Statuses
2K

Husband. Hacker. Adversary Simulation team lead. OSCP.

127.0.0.1
Joined September 2009
Don't wanna be here? Send us removal request.
@_dru1d
dru1d
1 year
Here’s a short write-up covering some research Ian Odette (@wikibinge) and I conducted so that our team would have a documented method for cracking Citrix NetScaler system user passwords.
Tweet card summary image
github.com
An analysis of the user password hashing algorithm used by Citrix NetScaler - CDW-OffSec/NetScaler-Password-Hash-Type-5
1
34
47
@_dru1d
dru1d
3 days
RT @vector35: WARP speed ahead! Want to learn more about the future of function matching in Binary Ninja (and hopefully your other favorite….
Tweet card summary image
binary.ninja
Binary Ninja is a modern reverse engineering platform with a scriptable and extensible decompiler.
0
5
0
@_dru1d
dru1d
5 days
RT @_dirkjan: @NathanMcNulty Intune be like
Tweet media one
0
7
0
@_dru1d
dru1d
5 days
RT @unsigned_sh0rt: I automated the POC for stealing policies from MP relays from this blog into a modified version of mssqlclient https://….
Tweet card summary image
github.com
modified mssqlclient from impacket to extract policies from the SCCM database - garrettfoster13/mssqlkaren
0
42
0
@_dru1d
dru1d
8 days
RT @kyleavery_: if you want to train a model yourself with GRPO:.1. find a verifiable task: 2. add a new reward fun….
Tweet card summary image
github.com
Fully open reproduction of DeepSeek-R1. Contribute to huggingface/open-r1 development by creating an account on GitHub.
0
13
0
@_dru1d
dru1d
8 days
He’s not on X anymore, but Mike (GitHub: alfarom256) has a new post on how he developed his own tooling to abuse JDWP.
0
4
11
@_dru1d
dru1d
9 days
RT @phrack: At long last - Phrack 72 has been released online for your reading pleasure! . Check it out: https://t.….
0
327
0
@_dru1d
dru1d
9 days
RT @SPLATTERBRAIN01: Everywhere I look.Factor_ meals sit outside homes.baking in the sun.
0
7
0
@_dru1d
dru1d
9 days
I had a blast learning and working through some cool bug classes! It turns out the FAFO method can be useful for learning new things. 😂.
@chompie1337
chompie
9 days
A few hours left - leaving it open until the morning on West Coast. Only 3 winners 🤭. Congrats @malware_owl and @_dru1d !!.
0
2
10
@_dru1d
dru1d
11 days
RT @LowLevelTweets: i love how software was trending towards being more secure. more sanitizers shipping with clang. more software being w….
0
289
0
@_dru1d
dru1d
15 days
RT @rad9800: EDR vendors secure their sales pipelines but neglect monitoring GitHub for exposed installer tokens -leaving customers vulnera….
0
52
0
@_dru1d
dru1d
20 days
RT @unsigned_sh0rt: WSFC misconfigurations can turn your domain into one big fustercluck. I'm sharing fustercluck today as part of my #BHUS….
Tweet card summary image
github.com
POC tool to abuse windows server failover clusters - garrettfoster13/fustercluck
0
51
0
@_dru1d
dru1d
20 days
RT @unsigned_sh0rt: My presentation starts in 20 minutes! Oceanside C level 2. Hope to see you there! #BHUSA
Tweet media one
0
2
0
@_dru1d
dru1d
22 days
RT @SpecterOps: 👋 Say hello to Nemesis 2.0, a streamlined, Docker Compose-based platform that is laser-focused on file triage. After intro….
Tweet card summary image
specterops.io
Nemesis 2.0 is a complete rewrite of the Nemesis file enrichment pipeline with a simplified and extensible architecture, new interface, and a focus on file triage and operator workflows.
0
31
0
@_dru1d
dru1d
28 days
RT @SpecterOps: Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and….
Tweet card summary image
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
0
59
0