krp
@_kripteria
Followers
56
Following
113
Media
6
Statuses
45
Red Team at @BlackArrowSec https://t.co/hysiudD7Wk
Joined October 2022
Hi! I just published a technical deep dive into a complex and fun N-day vulnerability that allows to get RCE in a very popular e-commerce platform. Check it out! https://t.co/DaZX3R6ob4
hiddeninslack.github.io
INTRODUCTION
0
4
5
Tangled is a social engineering platform that weaponizes calendar event processing in Outlook and Gmail to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction. https://t.co/vz4ulB2SL3 Technical breakdown:
github.com
Open-source offensive security platform for conducting phishing campaigns that weaponizes iCalendar automatic event processing. - ineesdv/Tangled
2
44
146
Meetings You Didn’t Plan, But We Did In this post, @ineesdv breaks down how calendar event processing in Outlook and Gmail can be abused to deliver spoofed meeting invites that are automatically added to a user's calendar without interaction ➡️Read more: https://t.co/7RApljHair
0
21
19
El 7 de Febrero estaré por h-c0n dando una ponencia donde se examinará a bajo nivel cómo herramientas como BloodHound recolectan y procesan datos de Active Directory. También se presentará Neo4LDAP y se hablará de sus capacidad técnicas y soluciones :) https://t.co/jeAiKyvOGq
0
0
0
Overly complex ACL graphs? Neo4LDAP now helps you prioritise attack paths without losing visibility. • Editable ACE weights • Shadow Relationships Details + PoC 👇 https://t.co/fFuYupMwXj
0
1
1
This Thursday, our colleague @_Kudaes_ will be at @NavajaNegra_AB presenting Activation Context Hijack: a new code execution technique for Windows environments. ➡️ More info: https://t.co/KLCb6lWNDw
0
15
18
I just released MFTool, an NTFS parser that builds an in-memory map of a volume, allowing you to: - Read any file without opening a handle - Get the contents of locked/deleted files (registry hives, pagefile.sys, etc) - Perform fast, in-memory searches across the entire disk 🔗👇
4
43
175
Four months of development and maintenance have yielded considerable results. With the new changes introduced, the old demo was somewhat obsolete, so I decided to upload a new one where you can better see the current improvements to Neo4LDAP. https://t.co/F0vHKFP93w
1
4
5
AvePoint has fixed a vulnerability in DocAve, Perimeter and Compliance Guardian discovered by our researchers @m1ntko and @Calvaruga. This vulnerability can be used to achieve Remote Code Execution (RCE) in affected systems. ➡️ Advisory: https://t.co/bD9hLomlG1
0
8
8
New major update! The parsing and ingestion process now uses a concurrent method Indexes are now used to optimize search queries. This update reduces processing time from several hours on a db with 3 million relationships to ~40s. https://t.co/TEvMNyQ3tv
github.com
The JSON parsing and addition process has been improved by switching to a concurrent model, which greatly improves efficiency and speed. Additionally, indexes have been implemented to increase the ...
0
0
0
Support for logging into different databases has been added, which is useful when using neo4j-enterprise :) https://t.co/CgLwEfDTZR
github.com
1
0
0
Hi! new commit ^^ - The login request is now multithreaded to avoid timeouts - If an error appear during parse, it crashes the Qt Thread, (fixed) - Added wait mechanisms on multithreading just in case is needed (and to support the multithreaded login) https://t.co/oU1RmmY8G8
github.com
- The login request is now multithreaded to avoid timeouts when connecting to neo4j in other servers - Error message on parse had a bug that crashes the Qt Thread, now is fixed - Added wait mecha...
1
0
2
New commit for Neo4LDAP :) Graph drawing has been improved making it more efficient both during graph manipulation (moving nodes, hiding nodes...) and during initial painting. https://t.co/i37rCeAZfM
github.com
Graph drawing has been improved making it more efficient both during graph manipulation (moving nodes, hiding nodes...) and during initial painting.
1
0
0
Neo4LDAP - a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to BloodHound
github.com
Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to tools like ...
1
36
116
Hi, pushed a commit that fixes bugs and adds improvements: https://t.co/O2F303HjnB Adds support for FILETIME, GeneralizedTime and epoch Multithreading, smoother GUI and real-time debug information Informative messages while tasks are being executed (bulletproof frustration)
github.com
Bug Fixes Added support for Windows FileTime, LDAP GeneralizedTime, and UNIX timestamps. Fixed attribute parsing bug in custom queries. Improvements Implemented multithreading: each task now ru...
1
0
0
I have more visibility here than on linkedln even though I only have 44 followers vs 600. that's wild 😅
0
0
0
Integration with BloodHound Workflows • Import BloodHound JSON files (Legacy & CE formats) • Ingest data into Neo4j • Coexists with existing tooling and workflows https://t.co/6lck3Mto6D 🧵: 4/4
github.com
Neo4LDAP is a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to tools like ...
0
0
0
Neo4LDAP includes a graph view built for large AD environments: • Exclude nodes to reduce noise • Temporarily hide parts for better focus • Limit depth to simplify and control graph size These visualization features improve clarity when analyzing ACL relationships 🧵: 3/4
1
0
0
Neo4LDAP translates LDAP queries into Cypher internally, allowing users to: • Run complex and expressive queries directly against Neo4j • Avoid learning Cypher by using familiar LDAP syntax • Quickly create custom queries and extract relevant information 🧵: 2/4
1
0
0
Im happy to announce Neo4LDAP — a query and visualization tool focused on Active Directory environments. It combines LDAP syntax with graph-based data analysis in Neo4j, offering an alternative approach to tools like BloodHound. https://t.co/Y2g5wt8jCM 🧵: 1/4
3
28
56