Denny Fischer
@df_sec
Followers
303
Following
837
Media
57
Statuses
2K
IT-Security Consultant | Problem Solver | Father | Mastodon: https://t.co/ZNMpwcZQ3y | Bluesky: https://t.co/bNnR31nkOQ
Deutschland
Joined January 2010
TaskHound hunts privileged Windows scheduled tasks and exports them for BloodHound attack path analysis. https://t.co/JaFf8bkrTR
#infosec #pentest #redteam
github.com
Tool to enumerate privileged Scheduled Tasks on Remote Systems - 1r0BIT/TaskHound
0
0
0
NetExec Lab is a set of hands-on labs used in the NetExec workshop and CTF to help you mastering NetExec for your next pentest engagement. https://t.co/QFy1uoxQ5Y
#infosec #pentest
github.com
Lab used for workshop and CTF. Contribute to Pennyw0rth/NetExec-Lab development by creating an account on GitHub.
0
0
0
Extracts browser-stored data such as refresh tokens, cookies, saved credentials and more from modern Chromium-based and Gecko-based browsers (Chrome, Microsoft Edge, Firefox, Opera, Opera GX and Vivaldi). https://t.co/cpUCEEdGVj
#infosec #pentest #redteam
github.com
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers ...
0
0
0
Many cybersecurity myths are outdated and distract from real risks. An open letter calling for practical, evidence-based security advice. Read more: https://t.co/ITWqxtpb9Y
#infosec
hacklore.org
0
0
0
ProfileHound is a tool that enumerates Windows domain user profiles via the C$ share and exports them to BloodHound as a HasUserProfile edge making it easy to see which users have profiles on which hosts. https://t.co/c10hjrEKUk
#infosec #pentest #redteam
github.com
ProfileHound - BloodHound OpenGraph collector for user profiles stored on domain machines. Make informed decisions about looting secrets by identifying active user profiles on domain machines. - m4...
0
0
0
"HELP! MY ACCOUNT GOT HACKED!" - Business Email Compromise (BEC) Part 1 https://t.co/xwuLf1bRuy "The Anatomy of a Business Email Compromise Attack" - Business Email Compromise (BEC) Part 2 https://t.co/QlHgpZjmlt
#infosec #blueteam
truesec.com
Discover how Business Email Compromise attacks work, common entry points, and how attackers bypass MFA to target your organization.
3
1
0
Harden Windows Security by @CyberCakeX is an open source PowerShell module (with GUI/CLI/Unattended mode) that documents, automates and hardens Windows security settings based on supported Microsoft mechanisms https://t.co/7LzP8tflbl
#infosec #blueteam
github.com
Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation | Always up-to-date and works with the latest build of Windows | Provides tools and Guides for Pers...
0
0
2
If you have Active Directory Certificate Services (ADCS) in your environment, run Locksmith now! In Active Directory Security Assessments, we have found critical security issues in *most* ADCS configurations. The great thing about Locksmith is that it doesn't just highlight the
8
258
1K
Prowler by @ProwlerCloud is an open-source security tool that helps assess and enforce security best practices across AWS, Azure, Google Cloud and Kubernetes. https://t.co/wsXGKkrRAM
#infosec #BlueTeam
github.com
Prowler is the world’s most widely used open-source cloud security platform that automates security and compliance across any cloud environment. - prowler-cloud/prowler
0
0
0
This is so much! 🔥🔥😎 Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth is done which could be relayed to LDAP without Signing enabled. Or relayed to ADCS for a certificate. https://t.co/H83AIxtskn
github.com
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully...
5
180
578
Ransomware Tool Matrix by @BushidoToken: This repository lists tools used by ransomware gangs. Defenders can detect and block these commonly reused tools to stop intrusions. https://t.co/0BJOmKaVor
#infosec #blueteam
github.com
A resource containing all the tools each ransomware gangs uses - BushidoUK/Ransomware-Tool-Matrix
0
0
1
State-of-the-art phishing: MFA bypass by Jaeson Schultz @talossecurity
https://t.co/OwPk1zzsTC
#infosec #blueteam
blog.talosintelligence.com
Threat actors are bypassing MFA with adversary-in-the-middle attacks via reverse proxies. Phishing-as-a-Service tools like Evilproxy make these threats harder to detect.
0
0
0
ArgFuscator is an open-source web app that generates obfuscated command lines for common system tools. Great for testing your defenses against real-world attack techniques. https://t.co/FfokdhCweh
#infosec #pentest #redteam #blueteam
argfuscator.net
Generate obfuscated command-line arguments for common system-native executables now with ArgFuscator.
0
0
0
How well do you protect your privacy? The Privacy Checkup helps you assess your online surveillance defenses and take steps to protect your data. https://t.co/RujcfF6TrY (English, Deutsch, Español) #privacy #infosec
0
0
0
A great read on the exploitation of VMware vulnerabilities - from both attacker and defender perspectives - plus practical recommendations to strengthen your security posture. Breaking the Virtual Barrier: From Web-Shell to Ransomware https://t.co/zzTHTPDF57
#infosec #blueteam
sygnia.co
VMware VM escape vulnerabilities are being actively exploited, allowing attackers to take control of virtualization layers and deploy ransomware. This advisory explores a real-world attack scenario,...
0
0
1
Eine kriminelle Organisation hinter mehr als 75.000 Fake-Shops, >1M Bestellungen & >$50M Schaden. Einblick in ihr ausgeklügeltes System & wie sie Käufer täuschen. #38C3: "Fake-Shops von der Stange: BogusBazaar" mit @kaibiermann und kantorkel. https://t.co/UsvhSIwKHd
#infosec
0
0
0
Twitter: "Mastering Sysmon: Deploying, Configuring, and Fine-Tuning" by @dfirinsights A free mini eBook for #DFIR professionals with practical steps to deploy, fine-tune, and start logging with Sysmon. https://t.co/J76IWHa7Pj
#infosec #blueteam
0
0
2
Carseat by @0xthirteen is a Python implementation of GhostPack's Seatbelt, a situational awareness tool for analyzing Windows security configurations. https://t.co/deYuqX7PtZ
#infosec #pentest #redteam
github.com
Python implementation of GhostPack's Seatbelt situational awareness tool - 0xthirteen/Carseat
0
0
0
The fascinating security model of dark web marketplaces https://t.co/VHryUAWuZl
#infosec
0
0
0