Init1Security Profile
Init1Security

@init1security

Followers
7
Following
558
Media
1
Statuses
110

Elevating security with expert offensive strategies

Long Beach
Joined October 2024
Don't wanna be here? Send us removal request.
@init1security
Init1Security
3 days
RT @dmcxblue: Back from PTO and back on my Azure vulnerable lab project Function Apps, Runbooks, VMs, DBs, SPNs & more. Built to learn Azur….
Tweet card summary image
github.com
An HTA Application which builds Azure (Entra) Scenarios for Red Team Simulations - dmcxblue/AzureStrike
0
38
0
@grok
Grok
2 days
What do you want to know?.
96
50
335
@init1security
Init1Security
13 days
RT @mbrg0: we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us u….
0
907
0
@init1security
Init1Security
28 days
RT @dmcxblue: New? Initial Access maybe, yep we all heard of WSL and it's great integration with Windows you can build "WSL" file extension….
0
27
0
@init1security
Init1Security
29 days
RT @dmcxblue: A short GitHub repository explaining on weaponizing WSL file extensions.#redteam.
Tweet card summary image
github.com
A small How-To on creating your own weaponized WSL file - dmcxblue/WSL-Payloads
0
33
0
@init1security
Init1Security
1 month
RT @SEKTOR7net: Bypassing AMSI with your own custom COM interfaces inside CLR process - an excellent piece by Joshua Magri (@passthehashbrw….
0
70
0
@init1security
Init1Security
1 month
RT @OtterHacker: Okta chained with Azure with auto MFA subscription for Okta and frame-buster bypass to perform Bitb !. Evilginx is really….
0
53
0
@init1security
Init1Security
1 month
RT @dmcxblue: OK now I can reply to Email's, but the Font doesn't change more print() statements to see what's going on!!.#redteam https://….
0
1
0
@init1security
Init1Security
1 month
RT @C5pider: Introducing Havoc Professional: A Lethal Presence. We’re excited to share a first look at Havoc Professional, a next-generatio….
Tweet card summary image
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
0
184
0
@init1security
Init1Security
2 months
RT @dmcxblue: Building tools for Azure just made me realize:.1.- Azure is filled with undocumented endpoints and huge amount of resources.2….
0
5
0
@init1security
Init1Security
3 months
RT @5mukx: Understanding Syscalls: Direct, Indirect, and Cobalt Strike Implementation.
Tweet media one
Tweet media two
0
54
0
@init1security
Init1Security
3 months
RT @mrd0x: Finally had some time to publish these blogs. Enjoy!. Spying On Screen Activity Using Chromium Browsers..
0
185
0
@init1security
Init1Security
3 months
RT @akamai_research: Today we unveil BadSuccessor - a new no-fix Active Directory privilege escalation technique. We will explore the rece….
0
182
0
@init1security
Init1Security
3 months
RT @0xabc0: I’ve developed a Binary Ninja plugin to load encrypted riscy-business bytecode. It locates the encryption key, decrypts the byt….
0
43
0
@init1security
Init1Security
3 months
RT @al3x_n3ff: A new NetExec module just got merged: eventlog_creds🔥. It parses Windows Event ID 4688 logs (from "Audit Process Creation")….
0
82
0
@init1security
Init1Security
3 months
RT @dmcxblue: Ashley now builds winget files and VSIX files for Initial Access making it for 25 files in total and 5 file types for captu….
0
2
0
@init1security
Init1Security
3 months
RT @dmcxblue: Finally jumped on this Ai Red Team train and I am blown away by the results used and MCP Server to communicate to a simple C….
0
56
0