tzar
@dsec_net
Followers
313
Following
1K
Media
27
Statuses
629
Red Teamer, this is the neglected home of my security ramblings. Sometimes there's useful stuff.
South East, England
Joined June 2019
Finally releasing Sekken-Enum, an ADWS enumeration BOF we've been using internally for a while now. Based on the research from SOAPHound/SoaPy moving away from relying on .NET execution or proxying. Output works with BOFHound for Bloodhound ingesting. https://t.co/wVF2safhXC
github.com
adws enumeration bof. Contribute to Nomad0x7/sekken-enum development by creating an account on GitHub.
1
35
140
Password cracking with https://t.co/Yoyypck3N8 made easier :) Enjoy. https://t.co/1xXYbuJaWG
github.com
Vast.ai Password Kracking. Contribute to d-sec-net/VPK development by creating an account on GitHub.
1
1
13
My hot take on AI 🌶️. It's less about efficincy and more about scale. https://t.co/89AtZ7EOeg
2
15
44
Another awesome bit of linux Maldev research work from @k0zmer
single-threaded event driven sleep obfuscation poc for linux utilizing file descriptors, inspired by "pendulum" from @kyleavery_
https://t.co/7Zji03O1Ut
0
0
7
Nice new feature incoming for those RT's out there using Tailscale for inf. https://t.co/tzOe7CPD8L This change imo, addresses the what if on tail-scale being compromised. Cant really see any reason for headscale in prod if this is correctly rolled out now?
tailscale.com
Ensure that no node joins your tailnet unless trusted nodes in your tailnet sign the new node.
0
2
6
Looks sick, gui and automate all the things :)
I know AI isn’t for everyone, but I’ve been tinkering with it to make my engagement process a bit easier. I built a small tool inspired by @dsec_net’s Red Commander demos that lets you plug in your API keys (Mailgun/SendGrid, GoDaddy/Namecheap) and handles the work for you.
0
0
0
We've been putting these to good use lately on some ops. https://t.co/kpigB11j79 Keep an eye on future updates from @k0zmer. #redteam
github.com
Contribute to kozmer/aad-bofs development by creating an account on GitHub.
0
26
99
I'm calling it. Security has been solved.
“Microsoft Defender XDR demonstrates 100% detection coverage across all cyberattack stages in the 2024 MITRE ATT&CK® Evaluations” https://t.co/YdbKREf2oI
5
4
61
Excited to share that the @malcrove Red Team just dropped new blog and new tool SeamlessPass! utilizing Microsoft’s Seamless SSO feature to acquire access tokens for Microsoft 365 services by leveraging on-premises Active Directory Kerberos tickets https://t.co/pcYuhU7sbg
2
55
161
I haven't posted anything about Havoc in a while so imma share something I have been working on. Wrote a custom VM/Interpreter (based on the RISC-V instruction set) to execute exploits and other arbitrary code. The client is now fully extendable and scriptable via the Python API
29
77
549
One persons outage, is another persons OSINT op 😂
0
0
12
My talk on automating red team inf is out! There is a slight change to the release schedule mentioned in the talk. The API poc will be coming soon, but there have been some delays. Keep an eye out. Thanks for having me #x33fcon ! Looking forward to the next one!
4
23
89
Linux symbol obfuscation using `dl_iterate_phdr`. Great bit of research and blog from @k0zmer
https://t.co/eCzuarw6uW
bulletproof.co.uk
Obfuscating Linux Symbols: a novel approach to evade static analysis in Linux malware. Original security research from the Bulletproof.
0
2
5
Great talk on the process and results of hunting logic bugs in Mac land.
0
0
1
So... this is a pretty accurate description of the current situation...
2
7
32
I can make you click a phishing link. Want to know how? Just click this link and I will teach you ;) Don't worry. This is not a test. Nobody will know. Just do it:
specterops.io
Master the art of phishing with expert strategies and real-world examples. Increase your click-through rates and outsmart security measures effectively.
0
18
50
A few weeks ago I gave a talk at @a41con on how to phish for PRTs and phishing resistant authentication methods 👀. The slides, plus a demo video on how to do this with credential phishing are now on my blog:
dirkjanm.io
2
126
329