Max Grim
@max__grim
Followers
633
Following
521
Media
4
Statuses
100
Red Teamer @OutflankNL | Cyber Security | Messing around with hardware
NL
Joined June 2010
Would you like to be my colleague, and get to wear an awesome red hoodie? We are looking for a full-stack / offensive developer. Drop me a message or apply directly:
job-boards.greenhouse.io
The Netherlands
4
6
28
4.12 has been a blast to work on, and it’s awesome to see it release! Happy tinkering 😁
Cobalt Strike 4.12 is LIVE, complete with a new look for the GUI! Additionally, we're introducing: - A REST API - User Defined Command and Control (UDC2) - New process injection options - New UAC bypasses - and more! Check out the release blog for details. https://t.co/o80AbK9U8E
0
2
38
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
308
657
We're at BlackHat USA. At 1.30 PM our Outflank researcher @kyleavery_ will present his work on how he trained a 7B parameter LLM to defeat Microsoft Defender for Endpoint. An accompanying blog post will go out later today and we'll release the model on Hugging Face. Stay tuned!
0
9
46
The Registry Rundown. Last year Cedric Van Bockhaven & Max Grim showed us how even non-administrators can do some very interesting things with the registry. #Cybersecurity #WindowsRegistry #Infosec Watch here:
0
3
5
Yes! We're doing the Infosec Kart Cup again! 🏎️🤘 Mark June 19 in your calendars, and reserve your spot now at https://t.co/pVT7ca9Mqs! The 2024 edition was sold out.
0
3
6
Automatic browser SSO with a PRT on a victim device over an Outflank C2 implant 🥰 using ROADtools and some hackery from @max__grim
4
28
204
Headed to Singapore for BlackHat Asia? Be sure to stop by booth 507 to talk all things #offsec and then join @OutflankNL's @max__grim to learn how Outflank C2 (OC2) can cut through the noise and extract critical insights, enabling smarter operations.#BHASIA @BlackHatEvents
0
2
4
Headed to Singapore for BlackHat Asia? Join Outflank's own @max__grim for a deep dive into Outflank C2 (OC2) and discover how it can cut through the noise and extract critical insights, enabling smarter operations.#BHASIA @BlackHatEvents
0
4
13
Enjoying @1ns0mn1h4ck? Don't miss @c3c's speaking session on using VBS enclaves for handling sensitive data>
0
2
17
Virtual fortresses aren’t as invincible as they seem 🏰⚔️. Read about our latest research on using Secure Enclaves in Windows for offensive ops — plus fresh insights for red teamers. Check out Part 1 of our blog series here: https://t.co/I7eDWJFMQp
2
41
86
We worked with @_dirkjan to get this as an exclusive into Outflank Security Tooling with a new tool called ROADtune. ROADtune allows red teamers to: - bypass CAP by faking device compliance registration - loot secrets from applications pushed to compliant devices Cool stuff!
1
33
154
🚀 We're hiring a DevOps/Cloud Engineer at Outflank! Join us to build and manage complex Azure environments that deliver our OST toolkit. Skills: Kubernetes (AKS), GitOps, IaC, Tekton, Python💻 It's NOT an offensive role! Based in NL or a time zone-friendly region? Let's chat!
2
8
13
Pretty proud of this one, took a lot of work. And no, this device does not exist 😎
15
27
223
if you’re going to sector, let me know! i’ll be there this evening through friday
Headed to #SecTor2024? Join @kyleavery_ to learn how can #redteams keep up with networks that expand across Windows, macOS, and Linux systems> #SecTor @BlackHatEvents
2
5
13
For anyone who's badge I managed to "Pwnz0rz111" today at RedTreat, you can revert back to the "original" FW by booting the badge, and once my spooky purge face shows up, press the middle button (the up button) and then the top button (the select button). The image just overlays
1
11
87
And thats a wrap of #RedTreat 2024 2 days of hardcore red teaming research and meeting other rt researchers and operators. Mind still 🤯 processing some of the discussions! Thanks to all the attendees and speakers for being present at our little conf! /c @MDSecLabs @OutflankNL
15
12
67
Who’s the real #GrimResource? Spoiler: It’s us! 😏 Here's our latest blog on using MSC files for initial access: https://t.co/aQ0Of11pU8 Fun fact: @elastic’s post on this technique came from a sample caught by a blue team, originally used by a red team through our OST offering.
2
51
115
OST's Stage1 C2 is now Outflank C2, an optimised, OPSEC focused custom C2 framework with: •Native implants for Windows, macOS and Linux •Dynamic code exec •Proxying support •Peer-to-peer C2 between all three implants Get more info at https://t.co/UM2DPDBWqM
0
32
120
Sore muscled but satisfied looking back at the first #InfosecKartCup With 135+ people this was a fantastic social event for infosec profs in NL. Always great to connect offline! Thank you all for attending. Thank you @Northwave_Sec for co-organizing. See you next year?
1
3
36