defsecnsattack Profile Banner
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί Profile
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί

@defsecnsattack

Followers
1K
Following
527
Media
130
Statuses
3K

#CyberSecurity #Defense #Attack #Offensive #Forensics #Osint #BlueTeam #RedTeam #PenTesting

CyberSecurity Expert
Joined December 2014
Don't wanna be here? Send us removal request.
@cyb3rops
Florian Roth ⚑️
6 years
πŸ’―
2
41
181
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Misp project created a dedicated Misp instance to share information: https://t.co/9YdPVv8HEU ask them by DM the access. #COVID19 dedicated MISP
We have a dedicated MISP to share information about #COVID2019 https://t.co/64bWDpZAKr - If you want access DM us on Twitter.
1
4
9
@jvanegue
Julien Vanegue
6 years
With all these computer security conferences getting canceled, security professionals may actually be forced into securing computers.
12
83
498
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
SMBv3 Compression Tester Multiple scripts and detection tools to check if a Windows machine has SMBv3 protocol enabled with the compression feature. Our NSE script is based on smb2-capabilities.nse but we will PR the nmap repository with those changes. https://t.co/gNgcZr6U8r
github.com
CVE2020-0796 SMBv3 RCE. Contribute to claroty/CVE2020-0796 development by creating an account on GitHub.
0
6
8
@DarioBressanini
Dario Bressanini
6 years
PERCHΓ‰ serve l’isolamento sociale. Il mio piccolo contributo (con il Lego come al solito πŸ˜…)
13
148
379
@paolocamilli
Paolo Camilli
6 years
La spiego semplice semplice! ✏️#iorestoacasa #restiamoacasa
19
60
213
@Manuel_Real_Off
MANUEL Ⓜ️
6 years
Mi Γ¨ arrivato questo di whatsapp Che dire: #restiamoacasa
14
449
2K
@micatwitto
micatwitto
6 years
Vediamo se così riuscite a capire. È semplice. #iorestoacasa #irresponsabili
64
1K
4K
@ntlmrelay
Ring3API πŸ‡ΊπŸ‡¦
6 years
πŸ”¬"PRACTICAL THREAT HUNTING: DEVELOPING AND RUNNING A SUCCESSFUL THREAT HUNTING PROGRAM" by @arpanrvl and @washalsec πŸ’ͺ πŸ“•[SLIDES]: https://t.co/7glzsSzDT2 #ThreatHunting #blueteam #mitre #sacon
2
42
143
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
AggressorScripts Disclaimer: These scripts are to help you audit your machines or machines you're authorized to audit. https://t.co/TGqXSXqvcz
Tweet card summary image
github.com
Contribute to ramen0x3f/AggressorScripts development by creating an account on GitHub.
0
1
5
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
This tool is intended for penetration testers who want to perform an engagement quickly and efficiently. While this tool can be used for more covert operations (including some additions below), it really shines when used at the scale of a large network. https://t.co/SKbzDGcL14
Tweet card summary image
github.com
A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale via SMB, plus now with a user hunter - Raikia/CredNinja
0
1
3
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
PowerExfil A collection of custom data exfiltration scripts for Red Team assessments. https://t.co/0PcgKRIu8J
Tweet card summary image
github.com
A collection of data exfiltration scripts for Red Team assessments. - 1N3/PowerExfil
0
0
0
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
VB2019 paper: Pulling the PKPLUG: the adversary playbook for the long-standing espionage activity of a Chinese nation-state adversary https://t.co/MCjGLJswH3
0
0
0
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Threat Dragon is a free, open-source, cross-platform threat modeling application including system diagramming and a rule engine to auto-generate threats/mitigations. It is an OWASP Incubator Project. integration with other development lifecycle tools. https://t.co/KobUWaLjBr
Tweet card summary image
github.com
An installable desktop variant of OWASP Threat Dragon - mike-goodwin/owasp-threat-dragon-desktop
0
2
9
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Evasion techniques - Malware Evasion Encyclopedia, which contains over 50 techniques used by various malwares to detect virtualized and sandboxed environments. https://t.co/XHOEkxC7Qt
0
0
1
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Intelligence operation against targets in Indonesia β€œC:\Windows\System32\rundll32.exe” shell32.dll,ShellExec_RunDLL regsvr32 /s C:\ProgramData\pubpool.dll /i:process104.dll β€œC:\WINDOWS\system32\regsvr32.exe” /s C:\ProgramData\pubpool.dll /i:process104.dll https://t.co/GJjrO13HrS
0
1
1
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
The ADTimeline script generates a timeline based on Active Directory replication metadata for objects considered of interest. Replication metadata gives you the time at which each replicated attribute for a given object was last changed. https://t.co/aQcTgxDD3P
Tweet card summary image
github.com
Timeline of Active Directory changes with replication metadata - ANSSI-FR/ADTimeline
0
0
11
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
MSSQL forensics (1) - MDF fundamentals https://t.co/ikgFpkvKiQ
0
0
1
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Interesting Recon Script https://t.co/YwiWntWCp6
0
0
1
@defsecnsattack
πŸ…³πŸ…΄πŸ…΅πŸ†‚πŸ…΄πŸ…²πŸ…½πŸ†‚πŸ…°πŸ†ƒπŸ†ƒπŸ…°πŸ…²πŸ…Ί
6 years
Fraudsters cloak credit card skimmer with fake content delivery network, ngrok server https://t.co/V8FPTiIvtI
0
0
0