df_sec Profile Banner
Denny Fischer Profile
Denny Fischer

@df_sec

Followers
303
Following
837
Media
57
Statuses
2K

IT-Security Consultant | Problem Solver | Father | Mastodon: https://t.co/ZNMpwcZQ3y | Bluesky: https://t.co/bNnR31nkOQ

Deutschland
Joined January 2010
Don't wanna be here? Send us removal request.
@df_sec
Denny Fischer
1 day
TaskHound hunts privileged Windows scheduled tasks and exports them for BloodHound attack path analysis. https://t.co/JaFf8bkrTR #infosec #pentest #redteam
Tweet card summary image
github.com
Tool to enumerate privileged Scheduled Tasks on Remote Systems - 1r0BIT/TaskHound
0
0
0
@df_sec
Denny Fischer
6 days
NetExec Lab is a set of hands-on labs used in the NetExec workshop and CTF to help you mastering NetExec for your next pentest engagement. https://t.co/QFy1uoxQ5Y #infosec #pentest
Tweet card summary image
github.com
Lab used for workshop and CTF. Contribute to Pennyw0rth/NetExec-Lab development by creating an account on GitHub.
0
0
0
@df_sec
Denny Fischer
10 days
Extracts browser-stored data such as refresh tokens, cookies, saved credentials and more from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX and Vivaldi). https://t.co/cpUCEEdGVj #infosec #pentest #redteam
Tweet card summary image
github.com
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers ...
0
0
0
@df_sec
Denny Fischer
24 days
Many cybersecurity myths are outdated and distract from real risks. An open letter calling for practical, evidence-based security advice. Read more: https://t.co/ITWqxtpb9Y #infosec
hacklore.org
0
0
0
@df_sec
Denny Fischer
26 days
ProfileHound is a tool that enumerates Windows domain user profiles via the C$ share and exports them to BloodHound as a HasUserProfile edge making it easy to see which users have profiles on which hosts. https://t.co/c10hjrEKUk #infosec #pentest #redteam
Tweet card summary image
github.com
ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by identifying active user profiles on domain machines. - m4...
0
0
0
@df_sec
Denny Fischer
4 months
"HELP! MY ACCOUNT GOT HACKED!" - Business Email Compromise (BEC) Part 1 https://t.co/xwuLf1bRuy "The Anatomy of a Business Email Compromise Attack" - Business Email Compromise (BEC) Part 2 https://t.co/QlHgpZjmlt #infosec #blueteam
Tweet card summary image
truesec.com
Discover how Business Email Compromise attacks work, common entry points, and how attackers bypass MFA to target your organization.
3
1
0
@df_sec
Denny Fischer
5 months
Harden Windows Security by @CyberCakeX is an open source PowerShell module (with GUI/CLI/Unattended mode) that documents, automates and hardens Windows security settings based on supported Microsoft mechanisms https://t.co/7LzP8tflbl #infosec #blueteam
Tweet card summary image
github.com
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
0
0
2
@PyroTek3
Sean Metcalf
6 months
If you have Active Directory Certificate Services (ADCS) in your environment, run Locksmith now! In Active Directory Security Assessments, we have found critical security issues in *most* ADCS configurations. The great thing about Locksmith is that it doesn't just highlight the
8
258
1K
@df_sec
Denny Fischer
6 months
Prowler by @ProwlerCloud is an open-source security tool that helps assess and enforce security best practices across AWS, Azure, Google Cloud and Kubernetes. https://t.co/wsXGKkrRAM #infosec #BlueTeam
Tweet card summary image
github.com
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment. - prowler-cloud/prowler
0
0
0
@ShitSecure
S3cur3Th1sSh1t
7 months
This is so much! 🔥🔥😎 Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate. https://t.co/H83AIxtskn
Tweet card summary image
github.com
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully...
5
180
578
@df_sec
Denny Fischer
9 months
Ransomware Tool Matrix by @BushidoToken: This repository lists tools used by ransomware gangs. Defenders can detect and block these commonly reused tools to stop intrusions. https://t.co/0BJOmKaVor #infosec #blueteam
Tweet card summary image
github.com
A resource containing all the tools each ransomware gangs uses - BushidoUK/Ransomware-Tool-Matrix
0
0
1
@df_sec
Denny Fischer
10 months
ArgFuscator is an open-source web app that generates obfuscated command lines for common system tools. Great for testing your defenses against real-world attack techniques. https://t.co/FfokdhCweh #infosec #pentest #redteam #blueteam
argfuscator.net
Generate obfuscated command-line arguments for common system-native executables now with ArgFuscator.
0
0
0
@df_sec
Denny Fischer
10 months
How well do you protect your privacy? The Privacy Checkup helps you assess your online surveillance defenses and take steps to protect your data. https://t.co/RujcfF6TrY (English, Deutsch, Español) #privacy #infosec
0
0
0
@df_sec
Denny Fischer
10 months
A great read on the exploitation of VMware vulnerabilities - from both attacker and defender perspectives - plus practical recommendations to strengthen your security posture. Breaking the Virtual Barrier: From Web-Shell to Ransomware https://t.co/zzTHTPDF57 #infosec #blueteam
Tweet card summary image
sygnia.co
VMware VM escape vulnerabilities are being actively exploited, allowing attackers to take control of virtualization layers and deploy ransomware. This advisory explores a real-world attack scenario,...
0
0
1
@df_sec
Denny Fischer
1 year
Eine kriminelle Organisation hinter mehr als 75.000 Fake-Shops, >1M Bestellungen & >$50M Schaden. Einblick in ihr ausgeklügeltes System & wie sie Käufer täuschen. #38C3: "Fake-Shops von der Stange: BogusBazaar" mit @kaibiermann und kantorkel. https://t.co/UsvhSIwKHd #infosec
0
0
0
@df_sec
Denny Fischer
1 year
Twitter: "Mastering Sysmon: Deploying, Configuring, and Fine-Tuning" by @dfirinsights A free mini eBook for #DFIR professionals with practical steps to deploy, fine-tune, and start logging with Sysmon. https://t.co/J76IWHa7Pj #infosec #blueteam
0
0
2
@df_sec
Denny Fischer
1 year
Carseat by @0xthirteen is a Python implementation of GhostPack's Seatbelt, a situational awareness tool for analyzing Windows security configurations. https://t.co/deYuqX7PtZ #infosec #pentest #redteam
Tweet card summary image
github.com
Python implementation of GhostPack's Seatbelt situational awareness tool - 0xthirteen/Carseat
0
0
0
@df_sec
Denny Fischer
1 year
The fascinating security model of dark web marketplaces https://t.co/VHryUAWuZl #infosec
0
0
0