inversecos Profile Banner
inversecos Profile
inversecos

@inversecos

Followers
81K
Following
6K
Media
347
Statuses
4K

founder & hacker @xintraorg 🌎

uwu
Joined February 2019
Don't wanna be here? Send us removal request.
@inversecos
inversecos
8 months
How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀 I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗 https://t.co/Jx995rWoOp
42
424
2K
@inversecos
inversecos
11 days
This course is instructed by Adrian Justice @Zeroedtech, who has performed IR at Crowdstrike and at the Australian Cyber Security Centre (ACSC) for the government. He has extensive experience responding to APT compromises of government departments and critical infrastructure
1
1
18
@inversecos
inversecos
11 days
New XINTRA course‼️ Advanced IIS Post Exploitation, Detection & Evasion Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads. If your detection and response capabilities lag exposure, this course
3
34
254
@inversecos
inversecos
2 months
cover letters are basically corporate fan fiction tf you supposed to write 😩 “Nothing excites me more than logging into Entra ID…”
54
37
764
@inversecos
inversecos
2 months
💕updated the description thank you @vxunderground
2
1
19
@inversecos
inversecos
2 months
We based the entire story of the lab on CD Projekt Red compromise but updated ALL of the TTPs to use the latest techniques Scattered Spider uses 😉 this lab took a few iterations to get perfect. We hope you enjoy it <3 Here's the infected network you're investigating.
0
3
37
@inversecos
inversecos
2 months
NEW LAB: Scattered Spider (UNC3944) 🕷️🕸️ Scattered Spider hits indie studio AB Projekt Blue, deploying ransomware and stealing unreleased game code. Test your skills on: 👀 Social Engineering & MFA Fatigue 👀 Credential Theft via OST Files 👀 Bring Your Own Vulnerable Driver
10
89
516
@DebugPrivilege
DebugPrivilege
2 months
Hi all - I'm hiring a Principal Security Researcher who has strong knowledge in Active Directory and Entra ID. Are you interested in spending time to find the next ZeroLogon or BadSuccessor equivalent, as well as helping our product to improve? Go apply:
linkedin.com
Posted 11:11:06 AM. About UsAt Netwrix, our mission is to revolutionize data security by placing identity at the core -…See this and similar jobs on LinkedIn.
3
30
94
@princessakano
akano
2 months
✅ initial access achieved disk 11: @inversecos we psyop’d the one and only @inversecos! such a beautiful mammal inside and out; infectiously happy and joyful, i’m genuinely so glad i got to meet you not once but twice! 🖤🖤🖤
4
9
158
@LambdaMamba
Lena
3 months
We 🫶 malware @inversecos @MalwareVillage @DEFCON 33
9
9
242
@inversecos
inversecos
3 months
1
1
21
@inversecos
inversecos
3 months
Meow and I’ll give you ONE OF EACH
5
0
25
@inversecos
inversecos
3 months
ur girls at defcon so if u want @XintraOrg waifu & egirl stickers just come thru 🫶🏼
15
8
258
@inversecos
inversecos
3 months
a lot of “forensic” artifacts can be used in an evil way if you’re creative enough :D
4
4
55
@inversecos
inversecos
3 months
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) https://t.co/U7Jetiix6b
@T3chFalcon
IT Guy
3 months
Most red teamers ignore the clipboard. You can pull: – VPN creds – MFA tokens – AWS keys – Password manager dumps All from CTRL+C. Nobody checks it. Nobody clears it. But it’s always there. Use it. 👊🏾
25
324
2K
@inversecos
inversecos
3 months
this post was sponsored by an unnamed agency
24
9
302
@inversecos
inversecos
4 months
are honey traps still a thing? can I see photos of one 😝 for research purposes
14
0
103
@inversecos
inversecos
4 months
Become a contributor at XINTRA @XintraOrg 🔎 We're looking for RED and BLUE team contributors 🔴Red Team – Emulate real APT groups 🔵Blue Team – Investigate & respond to emulations What you get: - Challenging, realistic emulations - Hack & forensicate vendor devices -
10
20
133
@inversecos
inversecos
4 months
If you're interested in the comparison details, check it here below. https://t.co/K3AZWnUOYJ We have three new labs now in the pipeline with another 6 being planned out. Thank you for your patience with us as we are a super small team!
1
1
16
@inversecos
inversecos
4 months
Introducing XINTRA Enterprise Live!!!! Real-world threat simulation with live infrastructure. Our team took nearly 8 months to build it, and it's finally here :) We designed it for SOC/IR teams, with the power to collect evidence, deploy your own tools, and assign tasks...
10
33
206
@XintraOrg
XINTRA
4 months
XINTRA Public LIVE Trainings now open for 2025😍 🔹Small class sizes 🔹Course recordings included 🔹Slides, VMs and resource downloads provided 🔹EU, US and AU time zones supported 🔹Two instructors per class Black Hat USA in-person sessions also available (first two options) -
1
7
34