Kévin Tellier Profile
Kévin Tellier

@k3vinTell

Followers
116
Following
56
Media
3
Statuses
69

🥷@Synacktiv Moved to : https://t.co/nznTy39Yi4

Joined December 2021
Don't wanna be here? Send us removal request.
@Synacktiv
Synacktiv
1 month
Our ninjas are in Vienna for the T-REX conference! 🎤 @k3vinTell delivered a session exploring advanced Red Team lateral movement techniques built on DCOM - a great opportunity to exchange practices with fellow experts. Thank you to the @oenb for hosting such a great event!
0
2
10
@Synacktiv
Synacktiv
5 months
🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO attacks in Active Directory. Proud of the team! 🙌 cc @kalimer0x00 @quent0x1 @wil_fri3d
2
23
98
@Clubic
Clubic
6 months
🚨 Les experts français de @Synacktiv transforment le Thermomix en démonstration de hacking :) Manipulation de température, messages personnalisés... tout est possible ! On vous raconte ça 👉 https://t.co/PEMzzMrvAA #thermomix
1
7
19
@Synacktiv
Synacktiv
7 months
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. https://t.co/EY5Z53w1ZT
5
263
598
@wil_fri3d
Wil
7 months
Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !
@Synacktiv
Synacktiv
7 months
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. https://t.co/EY5Z53w1ZT
1
24
171
@hackthebox_eu
Hack The Box
7 months
To those who set the bar 🥂 Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition: 🥇 @Synacktiv 🥈 @GMOsecurity24 🥉 https://t.co/ScP85R5ljR #HackTheBox
2
21
111
@Synacktiv
Synacktiv
7 months
For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to @gmo_ierae and Downscope and thanks to @hackthebox_eu for the fun challenges! 🥳
1
23
92
@Synacktiv
Synacktiv
9 months
Our ninjas are attending SO-CON! Come and say hi 👋
0
4
28
@k3vinTell
Kévin Tellier
11 months
I'm out, see you on the other side : https://t.co/tDdbG6pf4g
0
0
1
@Synacktiv
Synacktiv
1 year
You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream). Here is an example with ldeep using relayed authentication from HTTP to LDAPs :
5
120
386
@Synacktiv
Synacktiv
1 year
You can now relay any protocol to SMB over Kerberos with https://t.co/5RNe2ykLAY and the latest PRs from @hugow_vincent. Thanks @_dirkjan for merging it! Here is an example from SMB to SMB:
9
202
600
@eliran_nissan
Eliran Nissan
1 year
I am excited to share with you my latest research - "DCOM Upload & Execute" An advanced lateral movement technique to upload and execute custom payloads on remote targets Forget about PSEXEC and dive in! https://t.co/ruQJlXgLqV https://t.co/Yp25P6pZvH
Tweet card summary image
github.com
DCOM Lateral movement POC abusing the IMsiServer interface - uploads and executes a payload remotely - GitHub - deepinstinct/DCOMUploadExec: DCOM Lateral movement POC abusing the IMsiServer interf...
12
247
597
@lowercase_drm
drm
1 year
Coffee break thoughts: "is it possible to bruteforce RPC endpoint to perform code exec if you can't access EPM/SMB?" 99% impacket atexec + 1% "for loop" = 100% prod ready https://t.co/1jecAPhXW0 (silent command only) h/t @saerxcit 🌻
0
60
172
@Synacktiv
Synacktiv
1 year
Oh, you didn't know? Cool kids are now relaying Kerberos over SMB 😏 Check out our latest blogpost by @hugow_vincent to discover how to perform this attack: https://t.co/4Drnk4BoBz
Tweet card summary image
synacktiv.com
Relaying Kerberos over SMB using krbrelayx
1
144
328
@Synacktiv
Synacktiv
1 year
Octoscan, our GitHub actions vulnerability scanner, is now available as a GitHub action! It will find vulnerabilities in new commits and pull requests, and upload it to GitHub as it now supports the SARIF file format! https://t.co/lEcnccw8H3
Tweet card summary image
github.com
📦 :octocat: A GitHub Action that performs a security scan of your GitHub Actions. - GitHub - synacktiv/action-octoscan: 📦 A GitHub Action that performs a security scan of your GitHub Actions.
0
13
54
@CICADA8Research
CICADA8Research
1 year
Hi! We'd like to share our new research with you. You've probably heard about COM Hijacking, but we've found another way of persistence via COM. Typelib! Read the article here: https://t.co/UNujo5gwzU
1
48
95
@decoder_it
Andrea P
1 year
Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement... uhh.. really?? can be bypassed with @splinter_code's clever SspiUacBypass tool. Check it out here: https://t.co/e1WWHi2Rnk
4
77
229
@TrustedSec
TrustedSec
1 year
During a recent engagement, @Bandrel discovered how an attacker can craft a CSR by using default system certificates. After finding out this method was novel, the team kept digging. Read what they found in our new #blog!
Tweet card summary image
trustedsec.com
Using default version 1 certificate templates, an attacker can exploit a vulnerability (EKUwu) to generate certificates that bypass security controls,…
4
126
260
@Synacktiv
Synacktiv
1 year
Just wrapped up two fantastic training sessions at #Hexacon! A big thank you to everyone who joined us for our deep dives into Active Directory/Azure and iOS internals. It was great to share knowledge and learn together!
1
5
25