Bhavin Patel Profile
Bhavin Patel

@hackpsy

Followers
385
Following
1K
Media
20
Statuses
506

Threat Research Team @splunk Maintainer of #atomic-red-team

Joined April 2015
Don't wanna be here? Send us removal request.
@ajkingio
AJ King
1 month
⚡The team killed it on this end of the year release of ESCU 5.19! I'm so grateful to work with such talented and passionate people. @nas_bench, @raven_tait, @bareiss_patrick, @hackpsy, @rodsoto, @tccontre18, Lou Stella Release: https://t.co/smqTLl7Dfx Key highlights: 🐚
0
3
10
@techspence
spencer
2 months
More sysadmins need to know this… User logon restrictions are free. Create a GPO and call it “DC Logon Restrictions - Domain Admins Only” Configure User Rights Assignment for DA accounts to log on locally on domain controllers and deny log on locally on end-user workstations.
7
31
247
@techspence
spencer
3 months
Never underestimate a properly caffeinated user and a little PowerShell knowledge ☕🔑😆
92
259
9K
@M_haggis
The Haag™
4 months
Your Fall Reminder to always Hunt Naked. https://t.co/Xx79eeLBCM
1
1
5
@M_haggis
The Haag™
5 months
Lua day. Someone has to be the reminder lol
0
4
16
@madhuakula
Madhu Akula
3 years
🥳 Woah! we got a new #Kubernetes Goat 🐐 scenario on @ciliumproject Tetragon for eBPF-based runtime #security monitoring, detection & enforcement 🚀 🔥Try it out yourself at https://t.co/eAYy6XFenu 🌟 Give a start if you like https://t.co/7omjqBTYLr #CNCF #Hacking #Community
1
16
62
@techspence
spencer
5 months
Isn’t it amazing that some of the best research and tools, is literally free because of some passionate skilled people devote their time to sharing?! 🙏🙌💪
@M_haggis
The Haag™
5 months
🔥💻 New tool drop! Meet MSIXBuilder 🎁 — the ultimate MSIX package creator for security testing, red team ops, and detection engineering! ✨ Features that slap: ⚡ One-click package builds (C# or PowerShell) 🔐 Auto cert creation + signing 🖥️ Sleek GUI w/ progress tracking &
0
3
39
@nas_bench
Nasreddine Bencherchali
5 months
[New Blog 📚] The Fragile Balance: Assumptions, Tuning, and Telemetry Limits In Detection Engineering If you ever struggle with false positives and the idea of tuning detections. This is for you. Read More - https://t.co/3m2NfpjHqf
3
28
63
@tccontre18
Br3akp0int
5 months
Picture Paints a Thousand "Codes": STRT analyzed a Quasar RAT campaign using image steganography to hide payloads inside harmless-looking images. 🔍 In our latest blog: How it works Key TTPs Detection for #Splunk & #Cisco NTDR Read: https://t.co/Dsqvzdy7A6 #int3 Demo tool:
2
11
36
@magicswordio
MagicSword
5 months
https://t.co/hYZrJW2Nkn now tracks over 290 RMMs, with new ones being added regularly. These tools provide legitimate functionality but are frequently repurposed by attackers. Read here: https://t.co/tnUFLYLTdi If you're not using them in your setup, why allow them to run?
0
15
33
@M_haggis
The Haag™
6 months
So I was deep in my webshell era this week 🧙‍♂️🕸️💻 and—plot twist—I totally got owned... by myself 😂 Naturally, I pulled the classic move: Did I read the source? Nope. Did I run it anyway? YOLO 🪂💥 Next thing I know, it casually goes full ninja mode and drops: cmd.exe ➡️
0
3
11
@M_haggis
The Haag™
6 months
🚨 NEW BLOG DROP 🚨 A little late to the CitrixBleed party… But still REALLY worth your time 🧠💥 💻 CitrixBleed (CVE‑2025‑5777) 🩸 Memory exposure ➡️ token hijacking 🛡️ Detection + mitigation tips inside! 👉 Read it now: https://t.co/vwtD7A3pGJ ⸻ 🔍 What you’ll learn: •🚔
Tweet card summary image
splunk.com
Discover how to detect, mitigate, and respond to CitrixBleed 2 (CVE-2025-5777), a critical Citrix NetScaler ADC and Gateway vulnerability exploited in the wild.
0
5
15
@nas_bench
Nasreddine Bencherchali
6 months
🚀 Happy to share my latest blog on @splunk: "Unlocking Endpoint Network Security Insights with Cisco Network Visibility Module (NVM) and Splunk" 🔗 Check it out here - https://t.co/q0wbQGHcb0 In this post, I walk through how Cisco Network Visibility Module (NVM) works, the
1
15
49
@hackpsy
Bhavin Patel
6 months
Stoked to present the research #STRT did with our Talos friends alongside @nas_bench and John Levy! And it includes a sweet demo at the end. Come say Hi :)
@splunk
Splunk
6 months
Let's supercharge your SOC. 🔋 Join the Splunk Threat Research Team alongside @TalosSecurity on July 23 to learn how to seamlessly integrate @Cisco Secure Firewall with #SplunkSecurity to up-level your response strategies.
0
2
9
@Frichette_n
Nick Frichette
9 months
Come see me at RSAC! I'll be speaking about common threat actor techniques seen in AWS intrusions, and why they're terrible! It'll be a Gordon Ramsey-style critique of cloud threat actors. In addition, we'll talk about how you can attack AWS environments better!
0
3
13
@nas_bench
Nasreddine Bencherchali
9 months
Introducing 🚀Eventlog Compendium 🚀 A new Streamlit app, that aims to be the go-to resource for understanding and playing with Windows Event Logs. Explore it 👉 https://t.co/wKrWWyOZLm Includes the following utilities and docs ⚙️ Build your own Advanced Audit Policy based on
5
105
311
@splunk
Splunk
9 months
SQL attacks are getting stealthier. Now is your chance to stay ahead with insights from the Splunk Threat Research Team on how your database can turn against you — and how to shut it down fast: https://t.co/4JQwLXtTGl #SplunkSecurity
1
2
3
@_josehelps
Jose Enrique Hernandez
11 months
The new documentation for contentctl https://t.co/p79SMrUG0L by Lou Stella is awesome. It now includes a straightforward guide for beginners, along with templates to streamline the testing and validation of Splunk content using GitHub Actions. If you haven't explored this
0
3
4
@_josehelps
Jose Enrique Hernandez
11 months
Cool people add ASCII art to their tools, at #STRT we add a a flag that `recognize` your value threat researcher♥️! https://t.co/sDusEVKJQR thank you @SnekCharmerr for letting me run with the silly.
Tweet card summary image
github.com
Because we care! ❤️
0
2
10
@krdmnbrk
Burak Karaduman
1 year
https://t.co/qPi4gXSUZ7 now supports Linux attack and detection rules, in addition to Windows! With 88 new Linux attacks added, this open-source solution, aligned with Sigma and Splunk rules, takes multi-platform threat detection to the next level.
Tweet card summary image
attackrulemap.com
Mapping of open-source detection rules and atomic tests.
1
57
252