kinako Profile
kinako

@kinako_software

Followers
3K
Following
47K
Media
486
Statuses
13K

Redteamer@🇯🇵 / OSCE3

Joined September 2018
Don't wanna be here? Send us removal request.
@kinako_software
kinako
1 day
AVTokyo着きました〜 お話したい人がいればぜひ😌
1
0
21
@kinako_software
kinako
6 days
cloudflare落ちてる時にiTerm2開いたら面白かった リリースノートの部分ってcloudflareなんだ
0
97
798
@kinako_software
kinako
9 days
it's time to write my first CfP for a security conference...🫰
0
0
15
@kinako_software
kinako
15 days
昨日はCTFer時代からの友人とロシア料理を頂いてきました! お互いCTFからは離れてしまったけど、こうした繋がりが続くのはありがたいですね😌
0
0
30
@x33fcon
/ˈziːf-kɒn/
22 days
Exciting news, infosec community! 🎉 The Call for Proposals for x33fcon is officially OPEN! Got a brilliant talk idea, a hands-on workshop, or an in-depth training you're eager to share? We want to hear from you! Conference dates: June 11-12, 2026 Training dates: June 8-10,
1
11
32
@kinako_software
kinako
22 days
1ヶ月かけて250ページの英文を読みつつrevを頑張り、やっと脆弱性のあるコードブロックに到達... exploit developmentとはこういうもの、という著者の声が聞こえてきた(助けてw)
0
0
10
@kinako_software
kinako
1 month
今日はドライバの解析ではなくデバッガやリバーシングの基礎固めをやる 何かヒントが得られればいいな
0
6
101
@kinako_software
kinako
1 month
👀
@CyberWarship
Florian Hansemann
1 month
''When Azure Relay Becomes a Red Teamer’s Highway – Hackers Hermanos'' #infosec #pentest #redteam #blueteam https://t.co/74Btyja0Db
0
0
3
@kinako_software
kinako
1 month
AVTokyoに参加予定でAWE受講された方がいらっしゃれば是非対面でお話ししたいのですが、TLにいらっしゃったりするかな…?😳
2
1
16
@kinako_software
kinako
1 month
I reported a tiny bug to BitDefender. They handled it very kindly and added me to their Hall of Fame😄 Might write a blog post in the future. Bug Bounty Hall of Fame
Tweet card summary image
bitdefender.com
1
0
8
@kinako_software
kinako
2 months
haha nice naming(石鹸🧼)
@Nomad0x7
Nomad0x7
2 months
Finally releasing Sekken-Enum, an ADWS enumeration BOF we've been using internally for a while now. Based on the research from SOAPHound/SoaPy moving away from relying on .NET execution or proxying. Output works with BOFHound for Bloodhound ingesting. https://t.co/wVF2safhXC
0
0
7
@kinako_software
kinako
2 months
激務すぎるなー… タスク多すぎて目が回る…
0
0
9
@kinako_software
kinako
2 months
とりあえず試験予約...
0
2
78
@kinako_software
kinako
2 months
冬にオーストラリア行ってみたいんだよな〜 本当に夏なのか実際に体験したみたい
0
0
7
@Defte_
Aurélien Chalot
2 months
Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳
5
192
929
@kinako_software
kinako
2 months
Linkedin見てると毎週誰かがOSEE合格してる…
0
0
13
@kinako_software
kinako
2 months
woah interesting...
@saerxcit
SAERXCIT
7 months
Since this is on here now, here's how to avoid the ADExplorer `(objectGUID=*)` IoC
0
1
1
@kinako_software
kinako
2 months
My PR for https://t.co/JmXAdJJa56 just got merged. cert_dump.py now runs without errors! Fix import errors and undefined constants in cert_dump.py by KinakoExE · Pull Request #73 · c3c/ADExplorerSnapshot.py · GitHub
Tweet card summary image
github.com
@c3c Hello, thank you for the great project. I noticed that cert_dump.py no longer works due to some import errors and undefined constants. After investigating, I found that the issues are similar ...
0
0
10