Chris Au Profile
Chris Au

@netero_1010

Followers
1K
Following
650
Media
6
Statuses
160

Red teamer, my tools for red teaming: https://t.co/j6Z018m09L, my blog to share offensive security stuff: https://t.co/MKvSTjpWoi

Hong Kong
Joined November 2018
Don't wanna be here? Send us removal request.
@netero_1010
Chris Au
10 months
RT @jsecurity101: We have all heard about attackers leveraging firewall policies or WFP to block EDRs from communicating with their servers….
Tweet card summary image
huntress.com
Discover how adversaries are using tools like EDRSilencer to tamper with EDR communications and learn how you can fight back.
0
124
0
@grok
Grok
17 days
Blazing-fast image creation – using just your voice. Try Grok Imagine.
264
519
3K
@netero_1010
Chris Au
10 months
Something interesting I found in SCCM remote control.
Tweet card summary image
netero1010-securitylab.com
20 October 2024
6
44
135
@netero_1010
Chris Au
1 year
RT @0x64616e: Binding to port 445 on Windows without WinDivert. This is highly useful for NTLM relaying. Big thanks to @zyn3rgy for the tal….
0
122
0
@netero_1010
Chris Au
1 year
RT @ommadawn46: “Windows Kernel Exploitation — HEVD on Windows 10 22H2” by ommadawn46.
Tweet media one
0
7
0
@netero_1010
Chris Au
2 years
RT @NinjaParanoid: Finally, the last release for this year - Brute Ratel v1.8 codename Mirage is here. Various internal updates for evasion….
0
23
0
@netero_1010
Chris Au
2 years
RT @h4wkst3r: Today I am releasing a whitepaper and new tool (ADOKit) as part of my @XForce research I will be presenting at @BlackHatEvent….
Tweet card summary image
github.com
Azure DevOps Services Attack Toolkit. Contribute to xforcered/ADOKit development by creating an account on GitHub.
0
128
0
@netero_1010
Chris Au
2 years
Made a tool to create/modify schedule task using just registry keys. It has some requirements (require SYSTEM) but the beauty of it is it wont generate schedule task creation event log.
Tweet card summary image
github.com
A tool employs direct registry manipulation to create scheduled tasks without triggering the usual event logs. - netero1010/GhostTask
6
127
361
@netero_1010
Chris Au
3 years
RT @KlezVirus: [RELEASE] After a little wait, I'm happy to present SilentMoonwalk, a PoC implementation of a TRUE call stack spoofer, resul….
Tweet card summary image
github.com
PoC Implementation of a fully dynamic call stack spoofer - klezVirus/SilentMoonwalk
0
239
0
@netero_1010
Chris Au
3 years
Having some fun to re-implement indirect syscall in C#.
Tweet card summary image
netero1010-securitylab.com
19 September 2022
1
63
174
@netero_1010
Chris Au
3 years
RT @bmcder02: Recently I got asked to do an overview on ETW. I tried to cover everything useful for #DFIR, including multiple ways to captu….
0
151
0
@netero_1010
Chris Au
3 years
RT @DebugPrivilege: I've wrote an article a few months ago about Kerberoasting with OpSec and I came across someone's work who wrote a tool….
Tweet card summary image
github.com
OPSEC safe Kerberoasting in C#. Contribute to Luct0r/KerberOPSEC development by creating an account on GitHub.
0
145
0
@netero_1010
Chris Au
3 years
RT @Un4v5s8bgsVk9Xp: とりあえずあと4話。
Tweet media one
0
336K
0
@netero_1010
Chris Au
3 years
RT @tiraniddo: I said I'd write up how you could exploit RBCD using a normal user account if you know the password. So here it is https://t….
0
233
0
@netero_1010
Chris Au
3 years
Exploit CVE-2022–26923 -> DCSync as domain controller -> Bypass most of the 4662 event based DCSync detection🤔.
0
0
1
@netero_1010
Chris Au
3 years
RT @ly4k_: The first blog post is here. This one covers the technical details of CVE-2022-26923 (Active Directory Domain Services Elevation….
Tweet card summary image
research.ifcr.dk
In this blog post, we’ll dive into a recently patched Active Directory Domain Privilege Escalation vulnerability that I reported through…
0
368
0
@netero_1010
Chris Au
3 years
RT @rootsecdev: Have fun everyone. Certifried: Active Directory Domain Privilege Escalation (CVE-2022–26923).
Tweet card summary image
research.ifcr.dk
In this blog post, we’ll dive into a recently patched Active Directory Domain Privilege Escalation vulnerability that I reported through…
0
233
0