
kozmer
@k0zmer
Followers
519
Following
3K
Media
0
Statuses
131
threat simulation @ r̴e̴d̴a̴c̴t̴e̴d̴
Joined August 2021
RT @0xthirteen: I wanted to find out if you could start the WebClient service remotely, so I ended up digging into it .
specterops.io
A walkthrough to answer the question: "Can you start the WebClient service remotely as a low privileged user?"
0
55
0
RT @kyleavery_: @_batsec_ in the US there is no formal standard for red team or purple team. everyone gets to do whatever the client wants.….
0
3
0
RT @OleFredrikBerg: Hi, I just released this python-version of @CICADA8Research's nice RemoteKrbRelay-tool. It is based on @_dirkjan's Krb….
github.com
A tool for coercing and relaying Kerberos authentication over DCOM and RPC. - OleFredrik1/remoteKrbRelayx
0
63
0
RT @SpecterOps: 🔴 Red and blue teams, this one's for you. 🔵. LudusHound bridges BloodHound Attack Paths with lab automation by creating a f….
0
79
0
RT @C5pider: Introducing Havoc Professional: A Lethal Presence. We’re excited to share a first look at Havoc Professional, a next-generatio….
infinitycurve.org
An introduction to Havoc Professional and Kaine-kit, exploring the advanced features and capabilities that make them lucrative for modern security professionals.
0
184
0
RT @dsec_net: Password cracking with made easier :) Enjoy.
github.com
Vast.ai Password Kracking. Contribute to d-sec-net/VPK development by creating an account on GitHub.
0
1
0
single-threaded event driven sleep obfuscation poc for linux utilizing file descriptors, inspired by "pendulum" from @kyleavery_ .
github.com
single-threaded event driven sleep obfuscation poc for linux - kozmer/silentpulse
1
21
74
RT @chompie1337: Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native….
ibm.com
Previously discovering a method for bypassing even the strictest WDAC policies by backdooring trusted Electron applications, the IBM X-Force Red team continued their research and can now bypass the...
0
238
0
RT @0xLegacyy: Yearly blog post just dropped: Control Flow Hijacking via Data Pointers 🐸 . Showcasing how to find your own in Binary Ninja,….
legacyy.xyz
When performing process injection, one of the most important IOCs that make up behavioural signatures is passing execution to our shellcode. Whilst there are multiple techniques to doing so and this...
0
76
0
RT @MDSecLabs: Stumbled on ServiceNow during a red team? If not you might want to check our latest post on Red Teaming with ServiceNow by @….
0
100
0
RT @BaffledJimmy: Wrote up some notes on Puppet 101 and abusing Puppet across Linux / Windows. Comes with a Lab / Repo / POCs. https://t.co….
0
7
0
RT @decoder_it: KrbRelayEx-RPC tool is out! 🎉.Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and re….
0
163
0
RT @__invictus_: All Red Teamers should be aware of post beacon loss syndrome, and the stages that you go through. Denial - "the user has….
0
69
0
RT @HackingLZ: If you don't believe in sharing OST or whatever else, that's awesome. However, if your org is in consulting or even has an….
0
16
0
RT @__invictus_: @techspence I'll give you even more copium if you want. It's far far easier to be a blue teamer than red. BT has a huge am….
0
1
0