
bri5ee
@bri5ee
Followers
130
Following
732
Media
2
Statuses
47
Detection Engineering & IR | Red Team @wrccdc | OSCP, CRTO, CARTP | Prev @globalcptc @wrccdc competitor @calpolyswift | Prev @anduriltech
Joined August 2020
Posting my write up for @XintraOrg 's Hybrid Azure APT Emulation Lab (Husky Corp) Fairly in depth blog post walking through OAuth, Managed Identity, and PTA abuse, Pass the PRT, etc. Huge s/o to @inversecos and the team for making an amazing lab.
bri5ee.sh
cybersecurity blog about penetration testing, red teaming, blue teaming, and things.
4
43
102
RT @d_tranman: 2nd place @NationalCCDC concludes my participation in collegiate cyber competitions. I'm proud of my team @calpolyswift givi….
0
7
0
RT @NationalCCDC: Activity is picking up in the team @calpolypomona room, but the energy is electric and these students are pushing through….
0
3
0
RT @NationalCCDC: Congrats to the top 10 teams joining us this week (April 25-27) in San Antonio, TX for the 19th Annual #NCCDC! . Read abo….
0
18
0
Created a blog post with my good friend @jefivefive discussing a methodology of organizing and crafting notes with Obsidian for incident responders and analysts by correlating techniques/procedures and artifacts by utilizing links.
4
5
11
RT @byt3bl33d3r: The "code" for my Defcon 31 talk is live! Enjoy! 😈.
github.com
Spoof emails from any of the +2 Million domains using MailChannels (DEFCON 31 Talk) - byt3bl33d3r/SpamChannel
0
79
0
RT @nos3curity: CommandoVM got accepted to @BlackHatEvents USA Arsenal! Come see me show off the newest version we’ve been working hard on….
0
4
0
RT @jm33_m0: Read clear-text passwords from OpenSSH server process automatically . https://t….
0
115
0
RT @nos3curity: I decided to have myself a capstone of sorts, after attending the @Mandiant Practical Mobile Application Security training….
nosecurity.blog
I’ve never done any reverse engineering, mobile pentesting or game hacking. But this blogpost combines all three and tells the story of how I reverse engineered my childhood mobile game Spider-Man...
0
4
0
RT @NationalCCDC: The @calpolypomona @calpolyswift team is quickly working to put up their network defenses. go team! #NCCDC
https://t.co….
0
2
0
RT @wrccdc: Let's go @CyberApplied and @calpolyswift (@Stanford and @calpolypomona) Good luck at @NationalCCDC.
0
4
0
RT @d_tranman: Had a ton of fun finally getting a grasp on sleep encryption and trying to bypass Hunt Sleeping Beacons with Ekko. https://….
dtsec.us
Using Ekko to sort of bypass Hunt Sleeping Beacons
0
98
0
RT @nos3curity: I co-wrote this year’s Mandiant Red Team case study for the new M-Trends. Check it out! 🌚.
0
7
0
Made a blog post discussing my experiences Red Teaming at @wrccdc for the first time, things I saw during the comp, common mistakes I saw from Blue Teamers, and giving some advice to Blue Teamers competing in CCDC to help them improve:
bri5ee.sh
cybersecurity blog about penetration testing, red teaming, blue teaming, and things.
1
14
25
RT @d_tranman: I think I did the patchless/breakpoint in process amsi bypass thingy with C# .
0
65
0
RT @sanjivkawa: Just pushed SQLRecon v2.2. A big thanks to @_RastaMouse for contributing some enum modules and to @passthehashbrwn for help….
github.com
A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation. - GitHub - skahwah/SQLRecon: A C# MS SQL toolkit designed for offensive reconnaissance and post-exploitation.
0
34
0
RT @SEKTOR7net: Bypassing Windows Mark-of-the-Web (MotW) feature with a crafted ZIP file, by @mrgretzky . Enjoy the journey!. https://t.co/….
breakdev.org
Windows ZIP extraction bug (CVE-2022-41049) lets attackers craft ZIP files, which evade warnings on attempts to execute packaged files, even if ZIP file was downloaded from the Internet.
0
82
0