ajkingio Profile Banner
AJ King Profile
AJ King

@ajkingio

Followers
181
Following
719
Media
21
Statuses
250

Threat Research Manager @splunk / @SnapAttackhq now part of @Splunk now part of @Cisco / Detection Engineering / Dad

Joined September 2022
Don't wanna be here? Send us removal request.
@ajkingio
AJ King
22 days
โ˜ ๏ธTIL If you don't instruct GitHub to keep your email private, anyone can find it by cloning a repository you commit to and running `git shortlog` with the `-e` option. You can clean up the results using these options: `git shortlog -sne`. To learn how to keep your email
Tweet card summary image
docs.github.com
If you've chosen to keep your email address private when performing web-based operations, you can also choose to block command line pushes that may expose your personal email address.
0
0
1
@Kostastsale
Kostas
24 days
๐Ÿ“ข ๐—œโ€™๐—บ ๐—ฎ๐—ป๐—ป๐—ผ๐˜‚๐—ป๐—ฐ๐—ถ๐—ป๐—ด ๐—ง๐—ต๐—ฟ๐—ฒ๐—ฎ๐˜ ๐—›๐˜‚๐—ป๐˜๐—ถ๐—ป๐—ด ๐—Ÿ๐—ฎ๐—ฏ๐˜€, ๐—น๐—ฎ๐˜‚๐—ป๐—ฐ๐—ต๐—ถ๐—ป๐—ด ๐—ป๐—ฒ๐˜…๐˜ ๐˜†๐—ฒ๐—ฎ๐—ฟ! After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything
threathuntinglabs.com
Hands-on threat hunting labs built from real intrusions, not simulations.
17
66
383
@ajkingio
AJ King
29 days
โšกThe team killed it on this end of the year release of ESCU 5.19! I'm so grateful to work with such talented and passionate people. @nas_bench, @raven_tait, @bareiss_patrick, @hackpsy, @rodsoto, @tccontre18, Lou Stella Release: https://t.co/smqTLl7Dfx Key highlights: ๐Ÿš
0
3
10
@ajkingio
AJ King
1 month
Happy Thanksgiving! ๐Ÿฆƒ Immensely grateful for the incredible team I get to work with every dayโ€”legends like @M_haggis, @nas_bench, and @_josehelps. Genuinely good humans who make work enjoyable. โค๏ธ
1
2
6
@nas_bench
Nasreddine Bencherchali
5 months
[New Blog ๐Ÿ“š] The Ghost in the Logs: DFIR Through a Palimpsest Lens In this latest blog, I try to link the literary and historical concept "palimpsest" into the DFIR world. โ€œForensic echoesโ€ linger for those who are quite enough to listen. Read More - https://t.co/yDyl8AgSxo
3
30
123
@M_haggis
The Haagโ„ข
6 months
๐Ÿ”ฅ I've been talking about IIS modules for a while now ๐Ÿ—ฃ๏ธ The Splunk Threat Research Team just released our blog around CVE-2025-53770 SharePoint attacks and how some adversaries are using IIS modules for persistence ๐Ÿ’€ ๐ŸŽฏ Ways to hunt and gather these sneaky DLLs ๐Ÿ” Detection
1
18
61
@nas_bench
Nasreddine Bencherchali
6 months
๐Ÿš€ Happy to share my latest blog on @splunk: "Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk" ๐Ÿ”— Check it out here - https://t.co/q0wbQGHcb0 In this post, I walk through how Cisco Network Visibility Module (NVM) works, the
1
15
49
@M_haggis
The Haagโ„ข
6 months
Spicy!๐ŸŒถ๏ธ โ€œโ€ขT1505.004 Server Software Component: IIS Components | IIS worker process is loaded suspicious .NET assembly โ€œ Good times. These are tricky to track, if youโ€™ve never hunted modules, no better time than today. https://t.co/iMk1v8B4Y3
Tweet card summary image
splunk.com
This blog showcases how to enable and ingest IIS operational logs, utilize PowerShell scripted inputs to ingest installed modules and simulate AppCmd and PowerShell adding new IIS modules and disable...
@cglyer
Christopher Glyer
6 months
MSTIC blog on Sharepoint exploitation At least 3 actors exploiting CVE-2025-49706 & CVE-2025-49704 as early as July 7: Linen Typhoon Violet Typhoon Storm-2603 (CN-based actor deployed Warlock & Lockbit ransomware in past - current motivation unknown) https://t.co/IgEp6yxx3B
1
9
49
@magicswordio
MagicSword
6 months
Hackers are using legit Windows drivers. No malware. No alerts. Just trust, misused. LOLDrivers are a growing threat few are watching. This slide deck shows how the attack works and why it matters. ๐Ÿ“ท https://t.co/40E5JBsjpO #Cybersecurity #LOTL #InvestInSecurity #MagicSword
2
37
139
@M_haggis
The Haagโ„ข
9 months
๐Ÿšจ New drop for the defenders: The ClickGrab Interactive Analyzer is live. ๐Ÿง ๐Ÿ” If youโ€™re staring down FakeCAPTCHA chains, shady redirects, or weird JS doing clipboard voodoo โ€” this toolโ€™s for you. ๐Ÿงช Paste a URL โ†’ get: โ€ข HTML inspection โ€ข IOC extraction โ€ข Clipboard
3
21
63
@nas_bench
Nasreddine Bencherchali
9 months
Introducing ๐Ÿš€Eventlog Compendium ๐Ÿš€ A new Streamlit app, that aims to be the go-to resource for understanding and playing with Windows Event Logs. Explore it ๐Ÿ‘‰ https://t.co/wKrWWyOZLm Includes the following utilities and docs โš™๏ธ Build your own Advanced Audit Policy based on
5
105
311
@M_haggis
The Haagโ„ข
9 months
๐Ÿ“บClickGrab Streamlit App ๐Ÿ‘จโ€๐Ÿซ So anyway, nobody asked, but I figured a GUI would be really nice for this project. Next week! Be sure to โญ๏ธ and Follow - https://t.co/XCwg38harh Lot's more planned!
0
5
21
@M_haggis
The Haagโ„ข
9 months
๐Ÿ”ฅ๐Ÿ”ฅ Introducing ClickGrab ๐Ÿ”ฅ๐Ÿ”ฅ ๐Ÿ›ก๏ธ The Ultimate Tool for Analyzing ClickFix and FakeCAPTCHA! ๐Ÿ›ก๏ธ Check it out! ๐Ÿ‘‰ https://t.co/XCwg38harh Click Through Live ๐Ÿ“บ: https://t.co/uNlJwvhMrh Why ClickGrab is Important for Defenders and Researchers?! ๐Ÿš€ ClickGrab is an EPIC new tool
2
23
68
@_josehelps
Jose Enrique Hernandez
10 months
A recent @proofpoint blog by Selena Larson and team highlights a important trend: threat actors are increasingly using legitimate Remote Monitoring and Management (RMM) tools as first-stage payloads in email campaigns https://t.co/UB5CNbgiJR. The team did a excellent job on the
2
28
82
@ajkingio
AJ King
10 months
Infected by @bquintero is a fantastic book! I love how he ends each chapter with lessons learned. Highly recommend this book for anyone interested in cyber security and entrepreneurship. Fun coincidence โ€” right after I finished the book I found out my sister-in-law is taking a
0
1
10
@M_haggis
The Haagโ„ข
10 months
WELL, WELL, WELL... LOOK WHAT WE HAVE HERE! Sooooo... there's a lot more going on here than meets the eye. ๐Ÿ‘€ ๐Ÿ“ข Adding this to LOLRMM. Quick googles, ๐Ÿ” Here's what I found: ๐Ÿ”— https://t.co/LGfbkHnTRF and ๐Ÿ”— https://t.co/LnmbYT673o ๐Ÿ‘€ Some fun little surprises baked in: ๐Ÿ› 
@threatinsight
Threat Insight
10 months
New cyber threat research from @Proofpoint highlights how attackers are adapting to law enforcement disruptions, leveraging trusted software to evade detection and compromise systems. This blog details our team's findings: https://t.co/xMhlXMpODP. #malware #ransomware #dataloss
1
8
32
@M_haggis
The Haagโ„ข
10 months
๐Ÿšจ JUST DROPPED: Prefetch_Hunter ๐Ÿ”ฅ๐Ÿ”Ž I'm thrilled to share the latest addition to my PowerShell Hunter toolkit: Prefetch_Hunter! ๐Ÿš€ ๐Ÿ’ก Windows Prefetch files contain execution history of every program run on a system - a forensic goldmine! Prefetch_Hunter extracts, analyzes,
2
32
156
@M_haggis
The Haagโ„ข
10 months
๐ŸŽ‰ ๐Ÿ“ข New Forensic Tool Release: UserAssist_Hunt ๐ŸŽ‰ I'm excited to share my latest PowerShell forensics tool: UserAssist_Hunt! ๐Ÿš€ The Windows UserAssist registry keys are a goldmine of forensic evidence, tracking which applications users have executed. However, Microsoft
2
34
110
@M_haggis
The Haagโ„ข
11 months
๐Ÿš€ Excited to release SequelEyes - Your SQL Server Security Testing Toolkit! ๐Ÿ›ก๏ธ A defender's Swiss Army knife for SQL Server security testing and validation. The original projects were in my /notes repo, but now have grown complex enough for their own project! โœ…
Tweet card summary image
github.com
SQL, IIS, Oh My... . Contribute to MHaggis/SequelEyes development by creating an account on GitHub.
1
11
54
@_josehelps
Jose Enrique Hernandez
11 months
The new documentation for contentctl https://t.co/p79SMrUG0L by Lou Stella is awesome. It now includes a straightforward guide for beginners, along with templates to streamline the testing and validation of Splunk content using GitHub Actions. If you haven't explored this
0
3
4