k0zmer Profile Banner
kozmer Profile
kozmer

@k0zmer

Followers
545
Following
3K
Media
0
Statuses
144

threat sim @ r̴e̴d̴a̴c̴t̴e̴d̴

Joined August 2021
Don't wanna be here? Send us removal request.
@k0zmer
kozmer
2 days
https://t.co/ai6LeweBRB - a cursed sigreturn-oriented programming (srop) based sleep obfuscation for linux that encrypts PT_LOAD segments + heap
Tweet card summary image
github.com
sigreturn-oriented programming (SROP) based sleep obfuscation poc for Linux - kozmer/sigdream
1
26
59
@BaffledJimmy
BaffledJimmy
10 days
Can we have better implant comms please? Some ideas for different options and design ideas. https://t.co/UlnkgBT4Ae Woo Claude etc.
3
10
26
@deceptiq_
deceptiq
17 days
Detecting Entra ID Enumeration at Scale Every attacker and Red Teamer enumerating your Azure/Entra ID tenant runs the same playbook: AzureHound, RoadRecon, GraphRunner, all of which query the Graph API for service principals, group memberships, and role assignments to find
0
14
88
@rad9800
Rad
1 month
We are live! 15 canary token providers (10 persistent, 5 ephemeral) - all designed to exploit an adversary's decision making process. (And has the added fun consequence of making folk say "wait, that's a canary token??" in a demo)
@deceptiq_
deceptiq
1 month
Once in a blue moon as a red teamer, we encountered environments with canary technology deployed across their infrastructure. The tables flipped. Blue teams caught us immediately. Canary technology uniquely detects adversaries by exploiting their behavior - digital assets with
5
6
69
@williballenthin
Willi Ballenthin
2 months
preview: ida-cyberchef #idapro #cyberchef
5
20
130
@Nomad0x7
Nomad0x7
3 months
Finally releasing Sekken-Enum, an ADWS enumeration BOF we've been using internally for a while now. Based on the research from SOAPHound/SoaPy moving away from relying on .NET execution or proxying. Output works with BOFHound for Bloodhound ingesting. https://t.co/wVF2safhXC
Tweet card summary image
github.com
adws enumeration bof. Contribute to Nomad0x7/sekken-enum development by creating an account on GitHub.
1
35
140
@chompie1337
chompie
3 months
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
25
121
623
@_dirkjan
Dirk-jan
3 months
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog:
dirkjanm.io
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise...
141
905
3K
@daaximus
Daax
3 months
If you find yourself wanting a pdf for a single instruction (Intel || AMD), and not dealing with the entire manual: https://t.co/L5Z5lv6UzI<instruction>.pdf You can see the index @ https://t.co/L5Z5lv6UzI Just as an alternative to FelixCloutier’s site, it will update every new
revers.engineering
Browse Intel and AMD x86 assembly instructions with complete documentation links.
7
58
276
@0xthirteen
Steven
4 months
I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it
Tweet card summary image
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
1
59
124
@kyleavery
Kyle Avery
5 months
@_batsec_ in the US there is no formal standard for red team or purple team. everyone gets to do whatever the client wants. some companies hire great teams to do good work, others don’t get so lucky. without a TIBER equivalent, there is nothing to stop me from selling a pentest (or worse,
2
3
20
@SpecterOps
SpecterOps
5 months
🔴 Red and blue teams, this one's for you. 🔵 LudusHound bridges BloodHound Attack Paths with lab automation by creating a functional Active Directory replica testing environment. Read @bagelByt3s blog post for more. https://t.co/YOGMEQ8upC
6
79
221
@C5pider
5pider
5 months
Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! https://t.co/0aPVihoFIU
Tweet card summary image
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
57
187
742
@cor_ctf
Crusaders of Rust
6 months
Exploit write-ups for our 🚨latest 0-day🚨and the tragedy that swept the red black tree family dropping soon 👀 Here is a tiktok style video for those of you with no attention span thanks to slop and social media. Turn on the audio!!!
9
50
269
@k0zmer
kozmer
6 months
single-threaded event driven sleep obfuscation poc for linux utilizing file descriptors, inspired by "pendulum" from @kyleavery_ https://t.co/7Zji03O1Ut
Tweet card summary image
github.com
single-threaded event driven sleep obfuscation poc for linux - kozmer/silentpulse
1
21
73
@YuG0rd
Yuval Gordon
7 months
🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - https://t.co/c969sNjQH0
21
372
876