_theVIVI Profile Banner
Gabriel Profile
Gabriel

@_theVIVI

Followers
1K
Following
10K
Media
157
Statuses
3K

Security Engineer | Gamer

Nairobi, Kenya
Joined April 2013
Don't wanna be here? Send us removal request.
@HaifeiLi
Haifei Li
3 days
Ladies and gentlemen - here is a Notepad* RCE you've always wondered whether it was possible. https://t.co/BIJtHdcPOZ *Well, the modern, AI-powered one.. Who could have thought that with more features you bring more bugs.
8
88
642
@vxunderground
vx-underground
11 days
Non-malware schizos asking about why the Notepad++ malware payload was so interesting. Okay, we'll discuss it without getting too schizo. First, Rapid7 (and other various Cyber Threat Intelligence vendors) seem to generally attribute the Notepad++ compromise to Chinese APT
33
189
2K
@PyroTek3
Sean Metcalf
10 days
There are two main password attacks leveraged by adversaries; one is called Password Spraying and the other is called Kerberoasting. This post focuses on identifying accounts that may be targeted for Kerberoasting and how to harden the environment against Kerberoasting.
9
76
360
@cyb3rops
Florian Roth ⚡️
11 days
Yes, it's basically this #NotepadPlusPlusCompromise
@cyb3rops
Florian Roth ⚡️
11 days
This is bad. Putty level bad. https://t.co/3w1C8YiBu8
21
122
1K
@IntCyberDigest
International Cyber Digest
11 days
‼️🚨 BREAKING: Notepad++ Hijacked by Chinese State-Sponsored Hackers Traffic from targeted users were selectively redirected to malicious update servers.
52
246
2K
@TheXC3LL
X-C3LL
13 days
A small rant: The State of Art in Red Team is whatever you want to believe
x-c3ll.github.io
a rant about Red Teaming.
17
91
349
@SpecterOps
SpecterOps
14 days
New from @KingOfTheNOPs + @senderend: azureBlob, a Mythic C2 profile that uses Azure Blob Storage as transport.Supported Agents: 🐍 Medusa 🪽 Pegasus (new test agent) ❤️ Your fav agent (with simple integration guide) https://t.co/0jNpt5978o 🧵: 1/2
2
49
166
@MalDevAcademy
MalDev Academy
1 month
We published a new tool named PrefetchFileParser that enumerates and parses Windows Prefetch files (.pf) for extracting execution history. This tool can be utilized for both offensive and defensive purposes (see the README). https://t.co/Jnn6RWBL8Z
1
70
363
@buck_steffen
Steffen Buck
14 days
@Defte_ Update: Thanks to @RedTeamPT, I created a pull request for ntlmrelayx to reflect the new requirements: https://t.co/g42CHDxQdB Now Shadow Creds are working again 😀
5
82
281
@relay_royalty
Logan D
15 days
Introducing RelayKing. https://t.co/EiVApPiXzi Blog: https://t.co/0Vi6WxyAYq Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA
Tweet card summary image
depthsecurity.com
If you’re anything like me and/or an offensive security professional, you’re probably very, very familiar with NTLM relaying attacks against Active Directory environments. NTLM relay attacks are...
3
85
210
@H3KTlC
𝗛𝟯𝗞𝗧l𝗖
15 days
90% of cybersecurity is ‘who gave you that permission’
41
139
1K
@_dirkjan
Dirk-jan
18 days
I can't believe Microsoft killed one of my favorite labs in my Entra ID training 😭. The Azure CLI and Azure PowerShell are no longer FOCI clients. On a serious note: good for security!
6
28
117
@tom_doerr
Tom Dörr
19 days
Architecture model for red team operations https://t.co/H39NEOZeLQ
3
132
797
@GrahamHelton3
Graham Helton (too much for zblock)
18 days
Excited to disclose my research allowing RCE in Kubernetes It allows running arbitrary commands in EVERY pod in a cluster using a commonly granted "read only" RBAC permission. This is not logged and and allows for trivial Pod breakout. Unfortunately, this will NOT be patched.
46
379
3K
@podalirius_
Rémi GASCOU (Podalirius)
4 months
I have released an OpenGraph collector for network shares and my first blogpost at @SpecterOps on the subject! You can now visualize attack paths to network shares in BloodHound 👀 https://t.co/2e2DBIndcU
Tweet card summary image
specterops.io
ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.
3
97
231
@JJKcontents
Jujutsu Kaisen
22 days
me at my me for today’s wedding Maki episode
25
2K
12K
@_theVIVI
Gabriel
21 days
What an episode 🙌🏾
@sonic1nstinct
cheese (comms open)
22 days
Maki Zenin
0
0
1
@magicswordio
MagicSword
26 days
Adversaries weaponizing signed drivers as EDR killers? This is exactly why we built #loldrivers. wsftprm.sys (CVE-2023-52271) - legitimately signed, terminates AV/EDR via kernel access, NOT on MS blocklist. https://t.co/eM4F3uGXfb We've tracked it since Sept 2024. Defenders
loldrivers.io
wsftprm.sys Description Northwave Cyber Security contributed this driver based on in-house research. The driver has a CVSSv3 score of 6.1, indicating a antivirus killer impact. This vulnerability...
@ipurple
Panos Gkatziroulis 🦄
26 days
AV/EDR processes termination by exploiting a vulnerable driver (BYOVD)
3
34
122
@Mandiant
Mandiant (part of Google Cloud)
28 days
Net-NTLMv1 is outdated, insecure, and must go. 🛑 To help defenders prove the risk and accelerate deprecation, we’ve released a comprehensive dataset of rainbow tables. See how easily these keys can be recovered, and secure your environment. Read more: https://t.co/g4gjEAhCiv
3
85
284
@FIFAWorldCup
FIFA World Cup
26 days
The Champions of Africa 🏆🇸🇳
3K
49K
332K