inversecos
@inversecos
Followers
81K
Following
6K
Media
347
Statuses
4K
founder & hacker @xintraorg 🌎
uwu
Joined February 2019
How the NSA (Equation Group) allegedly hacked into China's Polytechnical University 👀 I analysed intelligence reports from Chinese cyber firms (360, Pangu, CVERC) to aggregate TTPs attributed to Equation Group. 🔗 https://t.co/Jx995rWoOp
42
424
2K
This course is instructed by Adrian Justice @Zeroedtech, who has performed IR at Crowdstrike and at the Australian Cyber Security Centre (ACSC) for the government. He has extensive experience responding to APT compromises of government departments and critical infrastructure
1
1
18
New XINTRA course‼️ Advanced IIS Post Exploitation, Detection & Evasion Modern APT groups are actively weaponizing ToolShell and fileless IIS tradecraft to compromise Exchange, SharePoint, ASP workloads. If your detection and response capabilities lag exposure, this course
3
34
254
cover letters are basically corporate fan fiction tf you supposed to write 😩 “Nothing excites me more than logging into Entra ID…”
54
37
764
We based the entire story of the lab on CD Projekt Red compromise but updated ALL of the TTPs to use the latest techniques Scattered Spider uses 😉 this lab took a few iterations to get perfect. We hope you enjoy it <3 Here's the infected network you're investigating.
0
3
37
NEW LAB: Scattered Spider (UNC3944) 🕷️🕸️ Scattered Spider hits indie studio AB Projekt Blue, deploying ransomware and stealing unreleased game code. Test your skills on: 👀 Social Engineering & MFA Fatigue 👀 Credential Theft via OST Files 👀 Bring Your Own Vulnerable Driver
10
89
516
Hi all - I'm hiring a Principal Security Researcher who has strong knowledge in Active Directory and Entra ID. Are you interested in spending time to find the next ZeroLogon or BadSuccessor equivalent, as well as helping our product to improve? Go apply:
linkedin.com
Posted 11:11:06 AM. About UsAt Netwrix, our mission is to revolutionize data security by placing identity at the core -…See this and similar jobs on LinkedIn.
3
30
94
✅ initial access achieved disk 11: @inversecos we psyop’d the one and only @inversecos! such a beautiful mammal inside and out; infectiously happy and joyful, i’m genuinely so glad i got to meet you not once but twice! 🖤🖤🖤
4
9
158
a lot of “forensic” artifacts can be used in an evil way if you’re creative enough :D
4
4
55
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) https://t.co/U7Jetiix6b
Most red teamers ignore the clipboard. You can pull: – VPN creds – MFA tokens – AWS keys – Password manager dumps All from CTRL+C. Nobody checks it. Nobody clears it. But it’s always there. Use it. 👊🏾
25
324
2K
are honey traps still a thing? can I see photos of one 😝 for research purposes
14
0
103
Become a contributor at XINTRA @XintraOrg 🔎 We're looking for RED and BLUE team contributors 🔴Red Team – Emulate real APT groups 🔵Blue Team – Investigate & respond to emulations What you get: - Challenging, realistic emulations - Hack & forensicate vendor devices -
10
20
133
If you're interested in the comparison details, check it here below. https://t.co/K3AZWnUOYJ We have three new labs now in the pipeline with another 6 being planned out. Thank you for your patience with us as we are a super small team!
1
1
16
Introducing XINTRA Enterprise Live!!!! Real-world threat simulation with live infrastructure. Our team took nearly 8 months to build it, and it's finally here :) We designed it for SOC/IR teams, with the power to collect evidence, deploy your own tools, and assign tasks...
10
33
206
XINTRA Public LIVE Trainings now open for 2025😍 🔹Small class sizes 🔹Course recordings included 🔹Slides, VMs and resource downloads provided 🔹EU, US and AU time zones supported 🔹Two instructors per class Black Hat USA in-person sessions also available (first two options) -
1
7
34