ntlmrelay Profile Banner
Ring3API 🇺🇦 Profile
Ring3API 🇺🇦

@ntlmrelay

Followers
7K
Following
11K
Media
402
Statuses
15K

#ThreatHunting / #BlueTeam engineer. I'm just looking for traces in the logs. Reading and retweeting cool stuff. MITRE ATT&CK Defender:CTI,SOCAsses,AE,PTM,THDE.

Ukraine
Joined October 2011
Don't wanna be here? Send us removal request.
@hackerschoice
The Hacker's Choice (@[email protected])
3 days
THC Release 💥: The world’s largest IP<>Domain database: https://t.co/I9OIucDu2T All forward and reverse IPs, all CNAMES and all subdomains of every domain. For free. Updated monthly. Try: curl https://t.co/HUrGIrdpLd Raw data (187GB): https://t.co/GM3L2DJYKF (The fine work
29
308
2K
@KeithRamphal
Keith Ramphal
3 days
@techspence, @NathanMcNulty I overcame new project-itis and finished (and removed the last few bugs) https://t.co/r5BI5cpmCL It's got a nice GUI, implements the tier model OUs + GPOs, alerts on cross tier violations, lets you bulk move things and creates Tier'd admin accounts
Tweet card summary image
github.com
Contribute to AlchemicalChef/ADTierModel-Rust development by creating an account on GitHub.
2
8
24
@ipurple
Panos Gkatziroulis 🦄
3 days
shellcode-mutator - shellcode transformation tool for YARA evasion
Tweet card summary image
github.com
shellcode transformation tool for YARA evasion. Contribute to kypvas/shellcode-mutator development by creating an account on GitHub.
1
16
67
@HuntressLabs
Huntress
3 days
Writing LDAP detections off docs can burn you. Andrew Schwartz shows why: what attackers send isn’t what Domain Controllers log. The OID-to-bitwise shift happens in logs—and missing it means dead rules. Detect from log reality, not theory. https://t.co/XyRsRwdcQp
3
20
89
@joe4security
Joe Security
4 days
Sandbox-Detection-main.exe under the microscope 🔬🔬🔬 by Joe Reverser. Brand-new trick or a familiar evasion making a comeback? https://t.co/h2A4HYff6k
2
15
51
@abuse_ch
abuse.ch
5 days
Unknown malware using WebSockets for botnet command&control, spreading through #ClickFix ⤵️ 🖱️ClickFix -> 📃VBS -> ⚙️MSI Payload delivery host: 🌐 https://t.co/oEUTwYR4jM Malware sample 🤖: https://t.co/KpQF5pjPlR Botnet C2 domains: 📡w2li .xyz 📡w2socks .xyz The same malware
2
35
132
@whokilleddb
db
7 days
New fav persistence method which works on Win11 25H2: Set the default key's value of HKCU\Software\Classes\CLSID\{18907f3b-9afb-4f87-b764-f9a4e16a21b8}\InprocServer32 to point to a malicious DLL and get shells from multiple programs even before a user logs in.
13
131
851
@hackerschoice
The Hacker's Choice (@[email protected])
6 days
THC Release: 🎄Smallest SSHD backdoor🎄 - Does not add any new file - Survives apt-update - Does not use PAM or authorized_keys Just SSHD trickery....adds one line only. More at https://t.co/zVCLwmbXv2 👌
5
105
512
@5mukx
Smukx.E
6 days
DLL Sideloading & Proxying basics: https://t.co/Pj46WZAogs
5
47
271
@ShitSecure
S3cur3Th1sSh1t
8 days
Multiple people posted today in the morning about backdoored Github repositories, such as for React4Shell Scan repositories or an WSUS Exploits. This one for example is backdoored and will compromise your system once you run it: - https://t.co/hpfxdxcCbE For fun, I analysed the
5
61
260
@redcanary
Red Canary, a Zscaler company
11 days
🍻 You've heard of BYOB, but what about BYO-VM? Earlier this year, Red Canary Intelligence detected an adversary bringing their own QEMU virtual machine (VM) into an environment under the guise of a technical support call following a spam bombing attack. 💣 🖥️ See what
0
6
18
@anyrun_app
ANY.RUN
16 days
🔴 LIVE from inside #Lazarus APT's IT workers scheme. For weeks, @BirminghamCyber & @north_scan kept #hackers believing they controlled a US dev's laptop. In reality, it was our sandbox recording everything. See full story and videos ⬇️ https://t.co/gRb7GKIERQ
13
133
497
@mgreen27
Matthew Green 🌻
18 days
I wrote a new blog: Hunting reflected .NET assemblies at scale with Velociraptor, detecting CLR patching, and dumping in-memory payloads for triage. #DFIR #Velociraptor https://t.co/C5MJzLHzU6
labs.infoguard.ch
.NET reflection is a common technique used by threat actors throughout the attack lifecycle. In this post, I introduce two Velociraptor capabilities for hunting reflection-loaded assemblies and...
2
18
84
@ScoubiMtl
Scoubi
18 days
I'm happy to share a new #BloodHound #OpenGraph extension with the commnunity!! Here's the link : https://t.co/6mp5Qpz2Bo It maps #MITRE ATT&CK. #Sigma and #AtomicRedTeam test all in one graph! More details in the README of the repo!
Tweet card summary image
github.com
Contribute to Scoubi/BloodSOCer development by creating an account on GitHub.
0
21
58
@joe4security
Joe Security
18 days
How do you analyze malware samples that won’t execute or show any behavior in a sandbox? Meet Joe Reverser 💪💪💪 - one of the first agentic automated malware & phishing analyst. Read more: https://t.co/W0vk0mcDiB
1
13
75
@Cyber_O51NT
Cyber_OSINT
18 days
In PART 2 of "Critical Strike: China's Hacking Training Grounds," insights reveal a sophisticated Cyber Range setup by China's Ministry of Public Security, designed for training operatives in cyber warfare against foreign digital infrastructures. #Cybers
0
15
30
@_RayRT
_Ray
19 days
Vibe coding last week, I wanted to automate some AD techniques in a single tool. Currently supports ESC1/4 (with strong mapping), ShadowCreds, UnPAC, LAPS, Kerberoast (and targeted), RBCD (just set, no S4U2Self/Proxy yet) more features coming https://t.co/oU2CZWkMir
0
26
95
@d1rkmtr
d1rkmtr
24 days
Detecting AnyRun sandbox more sandbox detection coming out in the future. Link : https://t.co/av7cLC8NCq
3
33
179