
Dominic Chell 👻
@domchell
Followers
17K
Following
16K
Media
2K
Statuses
16K
Just your friendly neighbourhood red teamer @MDSecLabs | Creator of /r/redteamsec | https://t.co/3k3EBAZqGd | https://t.co/KwO2OwDOkl
Manchester, England
Joined February 2009
RT @SpecterOps: New blog post just dropped!. West Shepherd breaks down extending the Mythic Poseidon agent for ARM64 Dylib injection on App….
specterops.io
This post details how the Mythic Poseidon agent was extended to support ARM64 Dylib injection on Apple Silicon
0
20
0
RT @_dirkjan: If you didn't find my Black Hat / Def Con slides yet, they are available on . Also includes the demo….
dirkjanm.io
0
63
0
RT @MalwareRE: #PipeMagic is a highly modular backdoor used by the financially motivated threat actor Storm-2460. It masquerades as a legit….
0
17
0
RT @phrack: At long last - Phrack 72 has been released online for your reading pleasure! . Check it out: https://t.….
0
319
0
RT @SEKTOR7net: Introducing bundles, both for individuals and teams!. Now you can get several courses on a reduced pricing. Go check it out….
0
24
0
RT @MalGamy12: 🇨🇳 UNC3886 deployed TinyShell backdoors on Juniper routers 📡 for stealthy long-term access. We detect it - no VT hits. 👻 Com….
0
70
0
RT @NCSC: The NCSC Cyber Series podcast features insights from our in-house cyber security experts & lively discussions with a range of ext….
open.spotify.com
Podcast · National Cyber Security Centre · Introducing the new podcast series from the National Cyber Security Centre (NCSC). Join us as we dive deep into the ever-evolving world of cyber security,...
0
17
0
RT @RedByte1337: Thanks to everyone who joined my DEFCON33 talk!🎉.For those of you who missed it and are interested in seeing how we can ex….
0
141
0
Had a blast teaching this one again, with a great set of students 💪.
Had an incredible time at Black Hat learning from the world-class red teamers of @MDSecLabs! Despite their 1337ness, they were very patient with those of us a little newer to cap dev and rusty on the latest and greatest TTPs😅 Thanks for the great course gents!
1
1
25
RT @Ea7_L1Ft_h4Ck: Had an incredible time at Black Hat learning from the world-class red teamers of @MDSecLabs! Despite their 1337ness, the….
0
3
0
Massive thanks to @ImmersiveLabs for supporting us with their platform for this training again 👌.
Day 1 of the @MDSecLabs Adversary Simulation and Capability Development training and #blackhatusa25 is about to begin 🙌
0
1
12
RT @olafhartong: During my #BHUSA talk I've released many ETW research tools, of which the most notable is BamboozlEDR. This tool allows y….
github.com
My conference presentations. Contribute to olafhartong/Presentations development by creating an account on GitHub.
0
117
0
Day 1 of the @MDSecLabs Adversary Simulation and Capability Development training and #blackhatusa25 is about to begin 🙌
0
8
77
RT @_CPResearch_: Unmasking the China-nexus #Storm2603 toolset that pre-dated the ToolShell wave. 📅Active since at least Apr 2025. 🔑Multipl….
research.checkpoint.com
Key Findings Introduction Check Point Research (CPR) has been closely monitoring the ongoing exploitation of a group of Microsoft SharePoint Server vulnerabilities collectively referred to as...
0
33
0
RT @_dirkjan: It's been almost a year since my last blog. So, here is a new one: Extending AD CS attack surface to the cloud with Intune….
dirkjanm.io
Active Directory Certificate Services (AD CS) attack surface is pretty well explored in Active Directory itself, with *checks notes* already 16 “ESC” attacks being publicly described. Hybrid certif...
0
195
0