
Chris Thompson
@retBandit
Followers
7K
Following
9K
Media
93
Statuses
1K
Head of Red team @ IBM X-Force. Black Hat Review Board. Founder and co-organizer of Offensive AI Con. Co-Founder of RemoteThreat. inveni et usurpa
San Diego, CA
Joined June 2011
BHUSA25 Training Registration is now live! .Advanced Red Teaming against MLSecOps and AI-as-a-Service Platforms. Early Bird Signup: MLSecOPS infrastructure and AI platforms present a significantly expanded attack surface for red teams. Blue teams lack.
0
6
21
RT @G0ldenGunSec: More on BH OpenGraph: Ran into some issues when attempting to map objects collected with partial info back to existing BH….
github.com
Middleware utility for enriching and uploading data gathered with arbitrary collectors - G0ldenGunSec/OpenImporter
0
22
0
RT @h4wkst3r: @retBandit and I are looking forward to teaching our students all about attacking and defending MLOps platforms at @BlackHatE….
0
6
0
RT @OutflankNL: New blog! Here's our case study on using LLMs for accelerating offensive R&D. Our post details how we used Large Language M….
outflank.nl
By leveraging AI as a research accelerator, we can dedicate more time to refining, testing, and hardening the techniques that ultimately make it into OST.
0
64
0
RT @G0ldenGunSec: New BH OpenGraph stuff is pretty cool, threw together a super basic PoC to map attack paths through SCCM this afternoon u….
0
26
0
RT @andyzou_jiaming: We deployed 44 AI agents and offered the internet $170K to attack them. 1.8M attempts, 62K breaches, including data l….
0
394
0
RT @FuzzySec: I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent….
github.com
Backend development stack for agents. Contribute to xforcered/Agent-Development-Stack development by creating an account on GitHub.
0
37
0
RT @natashenka: While most vendors ship timely patches for vulnerabilities reported by Project Zero, they don’t always reach users. Today,….
0
41
0
RT @OffensiveAIcon: Call For Speakers closes this Friday 7/18. Tell your friends. Tell your favorite offensive AI researchers. 🏃💨 https://….
sessionize.com
The first conference dedicated to offensive AI cybersecurity, coming to Oceanside, San Diego October 5-8, 2025.Offensive AI Con is an invite-only tech...
0
12
0
RT @ShitSecure: This is so much! 🔥🔥😎. Found two new Potato triggers just today. Not only Potato but can also be used for LPE as remote auth….
github.com
Gain insights into MS-RPC implementations that may be vulnerable using an automated approach and make it easy to visualize the data. By following this approach, a security researcher will hopefully...
0
181
0
RT @chompie1337: BYOVD is no longer required on modern Windows. a bunch of recent msft kernel patches just shove vulnerable kernel code beh….
0
56
0
RT @RyanFedasiuk: Wow. Spotted on a walk and I can’t believe it:. The office of the world’s first open-source intelligence agency — the For….
0
2
0
RT @OffensiveAIcon: How are you leveraging AI to advance offensive security? We want to hear about it at OAIC in October. CFP open now. ….
sessionize.com
The first conference dedicated to offensive AI cybersecurity, coming to Oceanside, San Diego October 5-8, 2025.Offensive AI Con is an invite-only tech...
0
8
0
RT @G0ldenGunSec: Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can….
ibm.com
Explore how Azure Arc can be identified in environments, misconfigurations in deployment can allow for privilege escalation, an overprovisioned Service Principal can be used for code execution and...
0
83
0
Come join us and learn how to attack AI platforms, model registries, training infrastructure, and backdoor models (and how to defend against these new attacks). It’s been a really hot topic with various military commands I’ve met with recently!.
A little over a week left to register for @retBandit and I's @BlackHatEvents #BHUSA training on attacking MLSecOps and AI-as-a-Service platforms. We are almost full for both the Sat/Sun and Mon/Tues sessions! .
0
10
35
RT @DistrictCon: We’re proud to announce the Review Board for DistrictCon’s call for papers! Our CFP will open next month, and we're excite….
0
25
0
RT @FuzzySec: I wrote a blogpost about Android on-device fuzzing -> Reproducing a million-dollar bug: WhatsApp CVE-2019-11932 (with AFL & F….
0
94
0