ajpc500 Profile Banner
Alfie Champion Profile
Alfie Champion

@ajpc500

Followers
3K
Following
4K
Media
83
Statuses
701

Founder at @delivr_to | Author of Practical Purple Teaming | Detection & Emulation at @github | Tweets my own

London, England
Joined November 2010
Don't wanna be here? Send us removal request.
@ajpc500
Alfie Champion
9 months
With a process that began two and a half years ago, I'm very excited to announce that I've written a book with @nostarch! ๐ŸŽ‰ "Practical Purple Teaming" tells you all you need to know to get started with collaborative offensive testing. https://t.co/2syCI1JmDd
Tweet card summary image
nostarch.com
Real-world threats demand real-world teamwork.
9
59
284
@PhorionTech
Phorion
9 days
Phorion Threat Report: a backdoored Cursor extension was used to deploy the Paradox Stealer infostealer into macOS developer workflows. The post breaks down the full infection chain, detection opportunities and why IDE extensions have become a reliable point of initial access.
18
13
46
@ajpc500
Alfie Champion
1 month
I got a sneak preview of this research and itโ€™s a must-see for anyone attacking or defending macOS environments! ๐ŸŽ๐Ÿช
@PhorionTech
Phorion
1 month
Our very own @_calumhall will be speaking at KawaiiCon (prev. KiwiCon!) today talking about Phorion's innovation in ransomware defence and recovery. Where he will be discussing the technical inner workings and some cool tricks to build a comprehensive anti-ransomware solution.
0
0
2
@SpecterOps
SpecterOps
1 month
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more โคต๏ธ
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
307
657
@ramimacisabird
Rami McCarthy
2 months
Finally disclosing the critical supply chain attack I've spent the last 6 months preventing: ๐Ÿงต
2
12
48
@hackerfren
Jacob Krell
2 months
I just finished reading my signed early edition of Practical Purple Teaming: The Art of Collaborative Defense by @ajpc500 (Alfie Champion), and it was an excellent read. The book serves as a complete survey of the tactics, tools, and procedures involved in purple teaming. It
8
49
369
@ajpc500
Alfie Champion
2 months
๐Ÿ’œ๐Ÿ’œ๐Ÿ’œ
@helpnetsecurity
Help Net Security
2 months
0
0
1
@chvancooten
Cas van Cooten
3 months
๐Ÿš€ Super excited to finally share that I have been working on a startup for over a year: @offensys! Offensys provides an enterprise platform for automated advanced attack simulations to enable continuous posture validation. ๐ŸŒCheck out our new website: https://t.co/h00eOYbJx5
16
19
121
@ajpc500
Alfie Champion
4 months
If you havenโ€™t already, check out @Print3M_โ€™s research on File System APIs here: https://t.co/DFFcVPTD2s We went down the exfil path for this research, but certainly some abuse potential there!
Tweet card summary image
print3m.github.io
FileJacking โ€“ Malware Initial Access technique with File System API. Backdoor files, read / write folders directly from the browser โ€“ no downloads.
@delivr_to
delivr.to
4 months
An infostealer that runs in the browser? Kinda. In our latest research, we explore how Chromium File System APIs can be abused to exfiltrate mapped network drives with a single drag-and-drop. Blog:
1
1
3
@Print3M_
Print3M
4 months
๐Ÿšจ I am publishing my research on the File System API. FileJacking might used to establish Initial Access. Key points: - File smuggling via File System API - Backdooring files directly from a browser - Reading / creating folders and files from a browser https://t.co/9apA0IrNCv
Tweet card summary image
print3m.github.io
FileJacking โ€“ Malware Initial Access technique with File System API. Backdoor files, read / write folders directly from the browser โ€“ no downloads.
8
47
158
@ajpc500
Alfie Champion
4 months
Friday 2pm. Come say hi! ๐Ÿ’œ
@nostarch
No Starch Press
4 months
First look at our DEF CON author lineup ๐Ÿ‘€ Come say hi โ€” these folks are as smart as they are fun at parties (very)!
0
0
3
@ajpc500
Alfie Champion
4 months
See you in Vegas! ๐Ÿ‘€โœ๏ธ๐Ÿ“š๐ŸŽฐ
@nostarch
No Starch Press
4 months
Red team vs blue team is so 2019. Our DEF CON special edition of Practical Purple Teaming by @ajpc500 shows you how to build collaborative security that actually works. Real threats, real defenses, real results. Coming to Vegas with the good stuff. ๐Ÿ‘€
0
0
8
@dmcxblue
David
5 months
A short GitHub repository explaining on weaponizing WSL file extensions https://t.co/DytprnESX3 #redteam
Tweet card summary image
github.com
A small How-To on creating your own weaponized WSL file - dmcxblue/WSL-Payloads
1
33
107
@ajpc500
Alfie Champion
5 months
A few yrs ago, when we began building https://t.co/Un5ApOoI7D, a piece of me wondered if we'd see the innovation and creativity in the threat landscape to justify writing this kind of blog. This is the fifth(!) time we've put together our Top 10 and... the answer is 100% yes ๐Ÿ˜…
delivr.to
Bringing purple teaming to email. Emulate the latest offensive techniques to measure your stack's effectiveness, track improvement, and quantify the threats that can reach your users.
@delivr_to
delivr.to
5 months
It's here. The latest iteration of our Top 10 includes the most important developments in initial access tradecraft; from macOS targeting of ClickFix, to Zip Smuggling, to QRLJacking. ๐Ÿ“š Blog:
0
1
13
@ajpc500
Alfie Champion
5 months
Cool to see our Sigma rule for FileFix detection being merged today ๐Ÿš€๐Ÿฉต https://t.co/WnpN4JSt9U
Tweet card summary image
github.com
Main Sigma Rule Repository. Contribute to SigmaHQ/sigma development by creating an account on GitHub.
@delivr_to
delivr.to
5 months
Threat actors have wasted no time operationalising the FileFix technique ๐Ÿ“โš ๏ธ ๐Ÿ“šCheck out our latest blog on detecting and preventing FileFix:
0
0
0
@ajpc500
Alfie Champion
5 months
Turns out the same ClickFix mitigation of โ€˜disablingโ€™ the Win+R shortcut (HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer - NoRun DWORD 1) also prevents exploitation of the address bar FileFix technique๐Ÿ’ก
5
76
303
@ajpc500
Alfie Champion
5 months
TIL that there's a Defender 365 detection for use of the Microsoft logo from a wiki page - "Phish_HTML_WithMsLogoFromWiki_A" ๐Ÿคฃ
@mrd0x
mr.d0x
6 months
FileFix - A ClickFix Alternative https://t.co/OMU7UADf9J
4
12
108
@jbradley89
Jaron Bradley
6 months
My next book is open for pre-orders!!! I have included the first two chapters in audiobook form for free. You can listen to them now on my website or you can listen and read the sample on Apple Books. Looking forward to getting it into your hands. https://t.co/wOlMwj4las
Tweet card summary image
themittenmac.com
https://youtu.be/OnIAmOz0TjoChapter 1https://youtu.be/9bQCWbe2kDwChapter 2Now Available in the U.S.Welcome to my latest book.ย Threat Hunting macOSโ€”a book that share
2
32
134
@delivr_to
delivr.to
7 months
Our Phishing Attack Technique Explorer is now live! ๐Ÿ˜ˆ๐Ÿ” Next time you browse our catalogue, you'll see a new view to find payloads combining popular attack techniques; from Pastejacking and Bring Your Own Interpreter, to HTML Smuggling and Auth Coercion https://t.co/gV29vxgOvk
0
9
22
@ajpc500
Alfie Champion
8 months
Using Mythic and VECTR on your purple teams? ๐Ÿ’œ Iโ€™ve just open-sourced a new Mythic service container that allows you to auto-populate VECTR test cases based on your Mythic taskings. https://t.co/Jm7En6gshy
Tweet card summary image
github.com
A service container for interacting with SRA's VECTR - MythicAgents/VECTR
0
21
111