AJ King
@ajkingio
Followers
181
Following
719
Media
21
Statuses
250
Threat Research Manager @splunk / @SnapAttackhq now part of @Splunk now part of @Cisco / Detection Engineering / Dad
Joined September 2022
โ ๏ธTIL If you don't instruct GitHub to keep your email private, anyone can find it by cloning a repository you commit to and running `git shortlog` with the `-e` option. You can clean up the results using these options: `git shortlog -sne`. To learn how to keep your email
docs.github.com
If you've chosen to keep your email address private when performing web-based operations, you can also choose to block command line pushes that may expose your personal email address.
0
0
1
๐ข ๐โ๐บ ๐ฎ๐ป๐ป๐ผ๐๐ป๐ฐ๐ถ๐ป๐ด ๐ง๐ต๐ฟ๐ฒ๐ฎ๐ ๐๐๐ป๐๐ถ๐ป๐ด ๐๐ฎ๐ฏ๐, ๐น๐ฎ๐๐ป๐ฐ๐ต๐ถ๐ป๐ด ๐ป๐ฒ๐
๐ ๐๐ฒ๐ฎ๐ฟ! After building threat hunting teams for large MSSPs, creating DFIR Labs for TheDFIRReport, and sharing years of free threat hunting material, I want to bring everything
threathuntinglabs.com
Hands-on threat hunting labs built from real intrusions, not simulations.
17
66
383
โกThe team killed it on this end of the year release of ESCU 5.19! I'm so grateful to work with such talented and passionate people. @nas_bench, @raven_tait, @bareiss_patrick, @hackpsy, @rodsoto, @tccontre18, Lou Stella Release: https://t.co/smqTLl7Dfx Key highlights: ๐
0
3
10
Happy Thanksgiving! ๐ฆ Immensely grateful for the incredible team I get to work with every dayโlegends like @M_haggis, @nas_bench, and @_josehelps. Genuinely good humans who make work enjoyable. โค๏ธ
1
2
6
[New Blog ๐] The Ghost in the Logs: DFIR Through a Palimpsest Lens In this latest blog, I try to link the literary and historical concept "palimpsest" into the DFIR world. โForensic echoesโ linger for those who are quite enough to listen. Read More - https://t.co/yDyl8AgSxo
3
30
123
๐ฅ I've been talking about IIS modules for a while now ๐ฃ๏ธ The Splunk Threat Research Team just released our blog around CVE-2025-53770 SharePoint attacks and how some adversaries are using IIS modules for persistence ๐ ๐ฏ Ways to hunt and gather these sneaky DLLs ๐ Detection
1
18
61
๐ Happy to share my latest blog on @splunk: "Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk" ๐ Check it out here - https://t.co/q0wbQGHcb0 In this post, I walk through how Cisco Network Visibility Module (NVM) works, the
1
15
49
Spicy!๐ถ๏ธ โโขT1505.004 Server Software Component: IIS Components | IIS worker process is loaded suspicious .NET assembly โ Good times. These are tricky to track, if youโve never hunted modules, no better time than today. https://t.co/iMk1v8B4Y3
splunk.com
This blog showcases how to enable and ingest IIS operational logs, utilize PowerShell scripted inputs to ingest installed modules and simulate AppCmd and PowerShell adding new IIS modules and disable...
MSTIC blog on Sharepoint exploitation At least 3 actors exploiting CVE-2025-49706 & CVE-2025-49704 as early as July 7: Linen Typhoon Violet Typhoon Storm-2603 (CN-based actor deployed Warlock & Lockbit ransomware in past - current motivation unknown) https://t.co/IgEp6yxx3B
1
9
49
Hackers are using legit Windows drivers. No malware. No alerts. Just trust, misused. LOLDrivers are a growing threat few are watching. This slide deck shows how the attack works and why it matters. ๐ท https://t.co/40E5JBsjpO
#Cybersecurity #LOTL #InvestInSecurity #MagicSword
2
37
139
๐จ New drop for the defenders: The ClickGrab Interactive Analyzer is live. ๐ง ๐ If youโre staring down FakeCAPTCHA chains, shady redirects, or weird JS doing clipboard voodoo โ this toolโs for you. ๐งช Paste a URL โ get: โข HTML inspection โข IOC extraction โข Clipboard
3
21
63
Introducing ๐Eventlog Compendium ๐ A new Streamlit app, that aims to be the go-to resource for understanding and playing with Windows Event Logs. Explore it ๐ https://t.co/wKrWWyOZLm Includes the following utilities and docs โ๏ธ Build your own Advanced Audit Policy based on
5
105
311
๐บClickGrab Streamlit App ๐จโ๐ซ So anyway, nobody asked, but I figured a GUI would be really nice for this project. Next week! Be sure to โญ๏ธ and Follow - https://t.co/XCwg38harh Lot's more planned!
0
5
21
๐ฅ๐ฅ Introducing ClickGrab ๐ฅ๐ฅ ๐ก๏ธ The Ultimate Tool for Analyzing ClickFix and FakeCAPTCHA! ๐ก๏ธ Check it out! ๐ https://t.co/XCwg38harh Click Through Live ๐บ: https://t.co/uNlJwvhMrh Why ClickGrab is Important for Defenders and Researchers?! ๐ ClickGrab is an EPIC new tool
2
23
68
A recent @proofpoint blog by Selena Larson and team highlights a important trend: threat actors are increasingly using legitimate Remote Monitoring and Management (RMM) tools as first-stage payloads in email campaigns https://t.co/UB5CNbgiJR. The team did a excellent job on the
2
28
82
Infected by @bquintero is a fantastic book! I love how he ends each chapter with lessons learned. Highly recommend this book for anyone interested in cyber security and entrepreneurship. Fun coincidence โ right after I finished the book I found out my sister-in-law is taking a
0
1
10
WELL, WELL, WELL... LOOK WHAT WE HAVE HERE! Sooooo... there's a lot more going on here than meets the eye. ๐ ๐ข Adding this to LOLRMM. Quick googles, ๐ Here's what I found: ๐ https://t.co/LGfbkHnTRF and ๐ https://t.co/LnmbYT673o ๐ Some fun little surprises baked in: ๐
New cyber threat research from @Proofpoint highlights how attackers are adapting to law enforcement disruptions, leveraging trusted software to evade detection and compromise systems. This blog details our team's findings: https://t.co/xMhlXMpODP.
#malware #ransomware #dataloss
1
8
32
๐จ JUST DROPPED: Prefetch_Hunter ๐ฅ๐ I'm thrilled to share the latest addition to my PowerShell Hunter toolkit: Prefetch_Hunter! ๐ ๐ก Windows Prefetch files contain execution history of every program run on a system - a forensic goldmine! Prefetch_Hunter extracts, analyzes,
2
32
156
๐ ๐ข New Forensic Tool Release: UserAssist_Hunt ๐ I'm excited to share my latest PowerShell forensics tool: UserAssist_Hunt! ๐ The Windows UserAssist registry keys are a goldmine of forensic evidence, tracking which applications users have executed. However, Microsoft
2
34
110
๐ Excited to release SequelEyes - Your SQL Server Security Testing Toolkit! ๐ก๏ธ A defender's Swiss Army knife for SQL Server security testing and validation. The original projects were in my /notes repo, but now have grown complex enough for their own project! โ
github.com
SQL, IIS, Oh My... . Contribute to MHaggis/SequelEyes development by creating an account on GitHub.
1
11
54
The new documentation for contentctl https://t.co/p79SMrUG0L by Lou Stella is awesome. It now includes a straightforward guide for beginners, along with templates to streamline the testing and validation of Splunk content using GitHub Actions. If you haven't explored this
0
3
4