
Load.
@loadlow
Followers
287
Following
3K
Media
2
Statuses
406
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
98
0
RT @wil_fri3d: gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: It is a specialized util….
github.com
gpoParser is a tool designed to extract and analyze configurations applied through Group Policy Objects (GPOs) in an Active Directory environment. - synacktiv/gpoParser
0
169
0
RT @Synacktiv: 🔥 A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO….
0
23
0
RT @Synacktiv: 🔒 Can you really trust your zero trust? We (re)discovered a vulnerability in Zscaler Client Connector that allowed bypassing….
synacktiv.com
Should you trust your zero trust? Bypassing Zscaler posture checks
0
16
0
RT @Synacktiv: Don't miss @kalimer0x00 at #DEFCON33! .His talk, "SCCM: The Tree That Always Bears Bad Fruits", covers modern attack paths a….
0
20
0
RT @Synacktiv: Catch us at #DEFCON33!.@quent0x1 and @wil_fri3d will show how to turn your Active Directory into the attacker’s C2. They'll….
0
15
0
RT @Synacktiv: That's a wrap on our Azure Intrusion for Red Teamers training at #BHUSA! 4 intense days from zero to Global Admin via Entra….
0
6
0
RT @Synacktiv: We made it to MSRC 2025 Most Valuable Security Researcher leaderboard 🥳 Congratulations to all the other researchers!. https….
0
7
0
RT @Synacktiv: 🔐 Data encryption in Laravel environments is based on one secret: the APP_KEY. Our ninja @_remsio_ studied the impact of its….
synacktiv.com
Laravel: APP_KEY leakage analysis
0
39
0
RT @Synacktiv: @wil_fri3d now rocking the stage at #leHACK to present his new tool GPOParser to automate Active Directory GPOs analysis, ge….
0
4
0
RT @Synacktiv: Our ninja @kalimer0x00 is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the….
0
24
0
RT @Synacktiv: Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromi….
0
261
0
RT @Synacktiv: For our last talk, @croco_byte explains how to exploit SCCM policies to harvest credentials 🔑 #SSTIC2025 .
0
8
0
RT @Synacktiv: It's now time for @aevy__ and Paul Barbe to present Azure conditional access policies ☁️ #SSTIC2025
0
8
0
RT @Synacktiv: For our second talk of the day, @flgy presents Mofos, a virtual machines manipulation framework to mimic QubesOS on a standa….
0
7
0
RT @Synacktiv: For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to @gmo….
0
23
0
RT @Synacktiv: Last chance to grab early bird tickets for our Azure Intrusion training at #BHUSA 2025! Join us in Las Vegas for 100% offens….
0
7
0
RT @Synacktiv: Interested in vulnerabilities in video games? 🎮.@tomtombinary presented critical flaws in Neverwinter Nights Enhanced Editio….
synacktiv.com
Exploiting Neverwinter Nights
0
29
0