Quentin Roland Profile
Quentin Roland

@quent0x1

Followers
289
Following
277
Media
0
Statuses
65

Pentester @Synacktiv šŸ¤– https://t.co/FhHN2RnPym

Joined June 2022
Don't wanna be here? Send us removal request.
@quent0x1
Quentin Roland
5 days
RT @netbiosX: šŸ› ļø GroupPolicyBackdoor - a python utility for Group Policy Objects (GPOs) manipulation and exploitation. āœ… GPO attack vector….
Tweet card summary image
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
9
0
@quent0x1
Quentin Roland
6 days
RT @Synacktiv: The GroupPolicyBackdoor tool, presented at #DEFCON 2025, is now available on Synacktiv's GitHub: Thi….
Tweet card summary image
github.com
Group Policy Objects manipulation and exploitation framework - synacktiv/GroupPolicyBackdoor
0
98
0
@quent0x1
Quentin Roland
6 days
RT @0x64616e: My personal #defcon33 highlights:.Better tools for GPO exploitation: Critical vulns in Zscaler and Ne….
0
58
0
@quent0x1
Quentin Roland
16 days
RT @Synacktiv: šŸ”„ A few hours ago our experts took the stage at #DEFCON33, sharing cutting-edge research on SCCM exploitation and modern GPO….
0
23
0
@quent0x1
Quentin Roland
20 days
RT @Synacktiv: Don't miss @kalimer0x00 at #DEFCON33! .His talk, "SCCM: The Tree That Always Bears Bad Fruits", covers modern attack paths a….
0
20
0
@quent0x1
Quentin Roland
20 days
RT @Synacktiv: Catch us at #DEFCON33!.@quent0x1 and @wil_fri3d will show how to turn your Active Directory into the attacker’s C2. They'll….
0
15
0
@quent0x1
Quentin Roland
3 months
RT @Synacktiv: Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromi….
0
263
0
@quent0x1
Quentin Roland
3 months
RT @wil_fri3d: Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machi….
0
24
0
@quent0x1
Quentin Roland
3 months
RT @DirectoryRanger: Taking the Relaying Capabilities of Multicast Poisoning to the Next Level: Tricking Windows SMB Clients into Falling B….
Tweet card summary image
synacktiv.com
Taking the relaying capabilities of multicast poisoning to the next
0
5
0
@quent0x1
Quentin Roland
3 months
RT @Synacktiv: We still have a few talks for #SSTIC2025 last day! This morning, @hugoclout presents 2 proxy tools used during pentests 🌐 ht….
0
6
0
@quent0x1
Quentin Roland
3 months
RT @Synacktiv: For our last talk, @croco_byte explains how to exploit SCCM policies to harvest credentials šŸ”‘ #SSTIC2025 .
0
8
0
@quent0x1
Quentin Roland
5 months
RT @Synacktiv: Synacktiv was at @ToulouseHacking this week!.For the first talk, @croco_byte presented "Tapping into the SCCM policies goldm….
0
4
0
@quent0x1
Quentin Roland
5 months
RT @pentest_swissky: Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx - @croco_byte….
Tweet card summary image
synacktiv.com
Abusing multicast poisoning for pre-authenticated Kerberos relay over
0
19
0
@quent0x1
Quentin Roland
6 months
RT @BlackAlpsConf: šŸŽ„ RECORDED TALK #BlackAlps24 šŸŽ„. ⚔⚔⚔ Unveiling the offensive potential of Group Policy Objects in Active Directory: old -….
0
5
0
@quent0x1
Quentin Roland
6 months
RT @hacknspeak: šŸ‡«šŸ‡·šŸŽ™ļøNouvel Ć©pisode du podcast Hack'n Speak accompagnĆ© du seul et unique @croco_byte le terrible CROCO 🐊🐊🐊. C'est la partie….
Tweet card summary image
creators.spotify.com
Twitter: ⁠https://x.com/croco_byteTwitter: ⁠https://x.com/mpgn_x64⁠Blog post - ⁠https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx- https://www.synacktiv.com/publicat...
0
8
0
@quent0x1
Quentin Roland
6 months
RT @HackAndDo: That's gold šŸ’Ž Can't wait to try this out in an engagement.Long live HTTP relay.
0
4
0
@quent0x1
Quentin Roland
6 months
RT @Synacktiv: In our latest article, @l4x4 revisits the secretsdump implementation, offering an alternative avoiding reg save and eliminat….
Tweet card summary image
synacktiv.com
LSA Secrets: revisiting secretsdump
0
149
0
@quent0x1
Quentin Roland
6 months
RT @Synacktiv: In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav….
Tweet card summary image
synacktiv.com
Taking the relaying capabilities of multicast poisoning to the next
0
95
0