max__grim Profile Banner
Max Grim Profile
Max Grim

@max__grim

Followers
633
Following
521
Media
4
Statuses
100

Red Teamer @OutflankNL | Cyber Security | Messing around with hardware

NL
Joined June 2010
Don't wanna be here? Send us removal request.
@max__grim
Max Grim
3 days
Would you like to be my colleague, and get to wear an awesome red hoodie? We are looking for a full-stack / offensive developer. Drop me a message or apply directly:
job-boards.greenhouse.io
The Netherlands
4
6
28
@0xTriboulet
Steve S.
12 days
4.12 has been a blast to work on, and it’s awesome to see it release! Happy tinkering 😁
@_CobaltStrike
Cobalt Strike
12 days
Cobalt Strike 4.12 is LIVE, complete with a new look for the GUI! Additionally, we're introducing: - A REST API - User Defined Command and Control (UDC2) - New process injection options - New UAC bypasses - and more! Check out the release blog for details. https://t.co/o80AbK9U8E
0
2
38
@SpecterOps
SpecterOps
1 month
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
Tweet card summary image
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
4
308
657
@OutflankNL
Outflank
4 months
We're at BlackHat USA. At 1.30 PM our Outflank researcher @kyleavery_ will present his work on how he trained a 7B parameter LLM to defeat Microsoft Defender for Endpoint. An accompanying blog post will go out later today and we'll release the model on Hugging Face. Stay tuned!
0
9
46
@OrangeCon_nl
OrangeCon
6 months
The Registry Rundown. Last year Cedric Van Bockhaven & Max Grim showed us how even non-administrators can do some very interesting things with the registry. #Cybersecurity #WindowsRegistry #Infosec Watch here:
0
3
5
@OutflankNL
Outflank
8 months
Yes! We're doing the Infosec Kart Cup again! 🏎️🤘 Mark June 19 in your calendars, and reserve your spot now at https://t.co/pVT7ca9Mqs! The 2024 edition was sold out.
0
3
6
@_dirkjan
Dirk-jan
8 months
Automatic browser SSO with a PRT on a victim device over an Outflank C2 implant 🥰 using ROADtools and some hackery from @max__grim
4
28
204
@_CoreImpact
Core Impact
9 months
Headed to Singapore for BlackHat Asia? Be sure to stop by booth 507 to talk all things #offsec and then join @OutflankNL's @max__grim to learn how Outflank C2 (OC2) can cut through the noise and extract critical insights, enabling smarter operations.#BHASIA @BlackHatEvents
0
2
4
@OutflankNL
Outflank
9 months
Headed to Singapore for BlackHat Asia? Join Outflank's own @max__grim for a deep dive into Outflank C2 (OC2) and discover how it can cut through the noise and extract critical insights, enabling smarter operations.#BHASIA @BlackHatEvents
0
4
13
@OutflankNL
Outflank
9 months
Enjoying @1ns0mn1h4ck? Don't miss @c3c's speaking session on using VBS enclaves for handling sensitive data>
0
2
17
@OutflankNL
Outflank
10 months
Virtual fortresses aren’t as invincible as they seem 🏰⚔️. Read about our latest research on using Secure Enclaves in Windows for offensive ops — plus fresh insights for red teamers. Check out Part 1 of our blog series here: https://t.co/I7eDWJFMQp
2
41
86
@OutflankNL
Outflank
1 year
We worked with @_dirkjan to get this as an exclusive into Outflank Security Tooling with a new tool called ROADtune. ROADtune allows red teamers to: - bypass CAP by faking device compliance registration - loot secrets from applications pushed to compliant devices Cool stuff!
@_dirkjan
Dirk-jan
1 year
Pretty proud of this one, took a lot of work. And no, this device does not exist 😎
1
33
154
@OutflankNL
Outflank
1 year
🚀 We're hiring a DevOps/Cloud Engineer at Outflank! Join us to build and manage complex Azure environments that deliver our OST toolkit. Skills: Kubernetes (AKS), GitOps, IaC, Tekton, Python💻 It's NOT an offensive role! Based in NL or a time zone-friendly region? Let's chat!
2
8
13
@_dirkjan
Dirk-jan
1 year
Pretty proud of this one, took a lot of work. And no, this device does not exist 😎
15
27
223
@kyleavery
Kyle Avery
1 year
if you’re going to sector, let me know! i’ll be there this evening through friday
@OutflankNL
Outflank
1 year
Headed to #SecTor2024? Join @kyleavery_  to learn how can #redteams keep up with networks that expand across Windows, macOS, and Linux systems> #SecTor @BlackHatEvents
2
5
13
@_xpn_
Adam Chester 🏴‍☠️
1 year
For anyone who's badge I managed to "Pwnz0rz111" today at RedTreat, you can revert back to the "original" FW by booting the badge, and once my spooky purge face shows up, press the middle button (the up button) and then the top button (the select button). The image just overlays
1
11
87
@MarcOverIP
Marc Smeets
1 year
And thats a wrap of #RedTreat 2024 2 days of hardcore red teaming research and meeting other rt researchers and operators. Mind still 🤯 processing some of the discussions! Thanks to all the attendees and speakers for being present at our little conf! /c @MDSecLabs @OutflankNL
@MarcOverIP
Marc Smeets
1 year
Excellent group of red teamers: ✅ Fantastic talks line up: ✅ Awesome badge: ✅ #RedTreat
15
12
67
@OutflankNL
Outflank
1 year
Who’s the real #GrimResource? Spoiler: It’s us! 😏 Here's our latest blog on using MSC files for initial access: https://t.co/aQ0Of11pU8 Fun fact: @elastic’s post on this technique came from a sample caught by a blue team, originally used by a red team through our OST offering.
2
51
115
@OutflankNL
Outflank
1 year
OST's Stage1 C2 is now Outflank C2, an optimised, OPSEC focused custom C2 framework with: •Native implants for Windows, macOS and Linux •Dynamic code exec •Proxying support •Peer-to-peer C2 between all three implants Get more info at https://t.co/UM2DPDBWqM
0
32
120
@OutflankNL
Outflank
1 year
Sore muscled but satisfied looking back at the first #InfosecKartCup With 135+ people this was a fantastic social event for infosec profs in NL. Always great to connect offline! Thank you all for attending. Thank you @Northwave_Sec for co-organizing. See you next year?
1
3
36