Rob Fuller
@mubix
Followers
79K
Following
5K
Media
2K
Statuses
33K
Dad / Husband / Marine / Student / Teacher / @Hak5 / @NoVAHackers / @SiliconHBO / @NationalCCDC / @MARFORCYBER Auxiliary
The Internet
Joined February 2007
If you have ever learned anything from me at all. I challenge you to pay it forward. I didn’t get to where I am by standing on the shoulders of giants, I got here by learning tidbits from hundreds of tweeters, bloggers, podcasters & presenters who chose to share their knowledge.
43
187
1K
From 300 lbs of C4 to wrangling 900 hackers, my journey from the Marines to cybersecurity on the Exit Buddy podcast. Huge thanks to Kathleen & Rachel for having me, and Happy 250th Birthday to my fellow Marines! 🇺🇸🎧
0
0
9
It is wild to realize that after 18 years on Twitter, I probably follow a bunch of accounts that’ve been taken over or compromised somehow, and there’s basically no way to tell or sort them out. I find randomness in my feed all the time that I unfollow after seeing.
7
0
21
SSK—the first U.S.-listed ETF that offers exposure to spot Solana and Solana staking rewards. SSK seeks to stake all (Solana) holdings on the Solana network. Any rewards earned may be distributed to shareholders, via monthly distributions. Distributions are not guaranteed.
2
11
78
Very cool find by @janbakker_ - lastUsedDateTime for authenticationMethod in Graph API🔥 This means we will eventually be able to clean up stale authentication methods! Many have been asking for this for a long time, very excited to see this in Graph API :)
3
13
122
If I have ever offered to help you with anything at all. This is your license to pester me as much as you humanly can to do so. I can make excuses but I promise I’ll never consider you reminding me as a bother.
4
0
15
I know something like this already exists somewhere, and absolutely open to learning better ways: https://t.co/yAMnQEFBwy For finding what might be affected by CVE-2025-59287 or you can use an EDR / OSQuery to find systems with the WSUSService service.
github.com
Helps defenders find their WSUS configurations in the wake of CVE-2025-59287 - mubix/Find-WSUS
1
53
201
#PRCCDC [Pacific Rim Collegiate Cyber Defense Competition] is looking for some volunteers for Ops, Orange Team, Scoring engine, judges, etc - Fill out the form, get the discord link join the Tuesday meetings: https://t.co/X58qnHZkYO
docs.google.com
As stated in the email, we need folks to be trained on the WRCCDC infrastructure since their experts will be remote. Having our own folks F2F who know / are familiar with the system will make PRCCDC...
1
12
24
I bet at least 80% of Entra admins would blindly grant RoleManagement.ReadWrite.All to an Enterprise app that was purchased by their company Most wouldn't even know what that means - and in doing so, they practically give Global Admin level permissions to the application vendor
@IAMERICAbooted Yeah, not long ago an app requested app role RoleManagement.ReadWrite.All - and by using Graph logs in a dev tenant I found out that the ONLY reason was that the automated onboarding process had to assign a non-GA Entra role to a service principal. 😵💫 «How ‘bout no»
16
41
258
Riot Platforms Reports Third Quarter 2025 Financial Results and Strategic Highlights. - Record quarterly revenue of $180.2 million - Net income of $104.5 million, or $0.26 diluted EPS - Adjusted EBITDA of $197.2 million - Announces initiation of 112 MW of core and shell for data
17
34
224
Ever wanted to exhaustively list every ACE your user has on AD objects? Well, it’s now possible with DACLSearch. Whether for security research or making sure you didn't miss an interesting ACE, this tool is for you. 🔗 Repo link : https://t.co/tC9sWOhOER
1
51
165
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️
specterops.io
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
5
308
650
Always fun when a vendor is asking you to create a ESC1 template
3
6
76
2008: Microsoft released a critical out-of-band patch via MS08-067 to close the vulnerability which was soon exploited by the Conficker worm. At its peak, variants infected about 10 million computers worldwide. How about the cake? @mubix designed it and brought it to DerbyCon.
2
9
30
Jesus is the true vine and the key to beating Satan's deception is to abide in Him.
3
2
64
Please remember that you don't have to go all APA or MLA citation requirements but giving reference to those that make the tool, or invented the thing you are talking about is a form of thanks to those that have provided that thing. It doesn't take much but it means a lot.
0
4
9
We’re pleased to have some very experienced speakers during SAINTCON 25, including Rob Fuller @mubix who has decades of experience in the industry from top to bottom. See a true “Lessons Learned” presentation on Thursday afternoon in Ballroom B! https://t.co/yG7n8pmLNU
saintcon2025.sessionize.com
In the Marines, “easy” was never the standard... and somehow, I’ve carried that into a cybersecurity career where I keep finding the hardest possible way to get things done. Sometimes it’s stubborn...
0
3
9
13 years ago I went to @GrrCON by myself and it was my first conference . I remember knowing then this was what I wanted to do in life One year I stopped at the @TrustedSec booth grabbed swag and said to myself I want to work here and I made it a reality!
6
8
191
Cisco ASA/FP - Be on the lookout for calls to these URLs 👇 GET /+CSCOU+/MacTunnelStart.jar GET /+CSCOL+/csvrloader64.cab GET /+CSCOL+/csvrloader.jar - Contain the Cisco SSL VPN Relay Loader - Likely used for version fingerprinting (CVE-2025-20333 / CVE-2025-20362)
1
77
232
I heard the term "Hate always comes from below" recently and it really resonated. The easy example is negative comments, but the harder ones to swallow is where I feel hate towards something or someone and if I really think about it, it still holds true.
0
0
8
When I launched Offensive Computing back in 2005, it was a site that revealed the dark secrets of malware and malicious techniques, and allowed people to access the malware to learn for themselves. I got a lot of backlash. People tried to get my site shut down, wanted me
4
13
50
To all who have followed me, or helped me in any way so far: I appreciate it. Sincerely. I just started releasing video this week. Since then several other former high ranking staff have reached out to me wanting to speak out as well. I'm recording tomorrow, and I'll be
1
2
30