kozmer
@k0zmer
Followers
545
Following
3K
Media
0
Statuses
144
https://t.co/ai6LeweBRB - a cursed sigreturn-oriented programming (srop) based sleep obfuscation for linux that encrypts PT_LOAD segments + heap
github.com
sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux - kozmer/sigdream
1
26
59
Can we have better implant comms please? Some ideas for different options and design ideas. https://t.co/UlnkgBT4Ae Woo Claude etc.
3
10
26
Detecting Entra ID Enumeration at Scale Every attacker and Red Teamer enumerating your Azure/Entra ID tenant runs the same playbook: AzureHound, RoadRecon, GraphRunner, all of which query the Graph API for service principals, group memberships, and role assignments to find
0
14
88
We are live! 15 canary token providers (10 persistent, 5 ephemeral) - all designed to exploit an adversary's decision making process. (And has the added fun consequence of making folk say "wait, that's a canary token??" in a demo)
Once in a blue moon as a red teamer, we encountered environments with canary technology deployed across their infrastructure. The tables flipped. Blue teams caught us immediately. Canary technology uniquely detects adversaries by exploiting their behavior - digital assets with
5
6
69
CVE-2025-59287 WSUS Remote Code Execution | HawkTrace -
hawktrace.com
A technical WSUS advisory for CVE-2025-59287: unsafe deserialization in Windows Server Update Services that allows remote code execution.
5
104
375
Finally releasing Sekken-Enum, an ADWS enumeration BOF we've been using internally for a while now. Based on the research from SOAPHound/SoaPy moving away from relying on .NET execution or proxying. Output works with BOFHound for Bloodhound ingesting. https://t.co/wVF2safhXC
github.com
adws enumeration bof. Contribute to Nomad0x7/sekken-enum development by creating an account on GitHub.
1
35
140
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
25
121
623
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
141
905
3K
If you find yourself wanting a pdf for a single instruction (Intel || AMD), and not dealing with the entire manual: https://t.co/L5Z5lv6UzI<instruction>.pdf You can see the index @ https://t.co/L5Z5lv6UzI Just as an alternative to FelixCloutier’s site, it will update every new
revers.engineering
Browse Intel and AMD x86 assembly instructions with complete documentation links.
7
58
276
I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
1
59
124
@_batsec_ in the US there is no formal standard for red team or purple team. everyone gets to do whatever the client wants. some companies hire great teams to do good work, others don’t get so lucky. without a TIBER equivalent, there is nothing to stop me from selling a pentest (or worse,
2
3
20
Hi, I just released this python-version of @CICADA8Research's nice RemoteKrbRelay-tool. It is based on @_dirkjan's KrbRelayx and @sploutchy's https://t.co/sLJiDOZjPQ and https://t.co/SjvgbFz7WX. Please check it out: https://t.co/LWtuRyVoue
github.com
A tool for coercing and relaying Kerberos authentication over DCOM and RPC. - OleFredrik1/remoteKrbRelayx
3
64
179
🔴 Red and blue teams, this one's for you. 🔵 LudusHound bridges BloodHound Attack Paths with lab automation by creating a functional Active Directory replica testing environment. Read @bagelByt3s blog post for more. https://t.co/YOGMEQ8upC
6
79
221
Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! https://t.co/0aPVihoFIU
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
57
187
742
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
9
50
269
Password cracking with https://t.co/Yoyypck3N8 made easier :) Enjoy. https://t.co/1xXYbuJaWG
github.com
Vast.ai Password Kracking. Contribute to d-sec-net/VPK development by creating an account on GitHub.
1
1
13
single-threaded event driven sleep obfuscation poc for linux utilizing file descriptors, inspired by "pendulum" from @kyleavery_
https://t.co/7Zji03O1Ut
github.com
single-threaded event driven sleep obfuscation poc for linux - kozmer/silentpulse
1
21
73
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷♂️ Read Here - https://t.co/c969sNjQH0
21
372
876