Josh
@passthehashbrwn
Followers
10K
Following
859
Media
181
Statuses
1K
Adversarial Simulation at IBM, tweets are mine etc.
Chicago, IL
Joined May 2020
If you're a state sponsored APT given a target you have two choices: Option 1. Use your unlimited money and resources Option 2. Ask Claude how to do corporate espionage
6
7
70
300 hours of Spanish video input since starting in May plus 75 hours of audio. Many hundreds more to go but crazy how well this works.
2
0
9
If you're into serious red teaming with a crazy skilled team we've got a US based opening!
ibmglobal.avature.net
3
35
135
Waking up and posting OSS hot takes despite having a completely blank GitHub commit history
1
0
18
Just wrapped up a great test with some really cool killchains, very lucky to be on a team where we get to do stuff like this regularly
1
0
24
This blog about the WSUS RCE got me thinking about the arbitrary difference between "script kiddie" and "very low skilled attacker". I want to study the brain of whoever used a stealthier inline .NET exec gadget just to run shit via cmd /c anyways
0
5
73
Ever been on an SCCM site server and *this* close to a DA pw that you couldn't decrypt for some reason? Check out my new blog looking at encryption in use within SCCM sites configured for High Availability and accompanying tooling to recover passwords:
ibm.com
Follow IBM X-Force as they work out the secrets to decrypting credentials vaulted by Microsoft’s System Center Configuration Manager (SCCM).
3
59
140
Unsleeping the long haul beacons but you haven't quite recovered from a con yet
5
7
68
Super grateful to get to see the team at OAIC, coming home from Oceanside with a new perspective on the field
0
2
12
Setting up a new laptop and it rules that Bing is still like oh you want to download software? Fuck you buddy here's malware
0
0
23
🚨 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Read more: https://t.co/66WEsWKeG1 A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code on a victim's machine.
3
0
11
Born too late to exploit MS08, born too early to deploy icebreakers in cyberspace, born just in time to trigger high severity EDR alerts
10
26
231
We're one blog about OR 1=1 SQL injection away from being secure I can feel it
0
0
8
I'm having cost imposed on me by the sheer volume of useless intro level blogs making it impossible to find actual info about entire classes of vulnerabilities, cool stuff
3
0
19
kernel hackers go serverless ring0 → cloud 9 ☁️ ?? brb pwning yr gpu nodes ✨
26
123
624
Car technology in 2025 is just an arms race where you either buy a monstrous SUV or get murdered by someone who did
Car technology in 2025: > Cameras on every inch of car > Everything's computer > Hybrid gas or electric > Enhanced safety features Car technology in 1995: > Manual roll down windows > Built in ashtray for cigarettes > Box of death, in event of car accident everyone dies
0
2
13
There's something inexplicably grim about using an AI slop image for this instead of an image with actual details. Was the issue with postMessage or POSTMESSSAGE?
3
4
25