Antonio Cocomazzi Profile
Antonio Cocomazzi

@splinter_code

Followers
9K
Following
3K
Media
150
Statuses
2K

offensive security - windows internals | BlueSky: https://t.co/ytvJCoaF2c | Mastodon: https://t.co/hNIHa6L14d

Italy
Joined August 2016
Don't wanna be here? Send us removal request.
@splinter_code
Antonio Cocomazzi
2 years
The slides of our joint research talk “10 Years of Windows Privilege Escalation with Potatoes” at #POC2023 are out! . 👉 cc @decoder_it
Tweet media one
4
149
382
@splinter_code
Antonio Cocomazzi
2 months
RT @decoder_it: I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehens….
0
150
0
@splinter_code
Antonio Cocomazzi
3 months
RT @MsftSecIntel: Microsoft has discovered post-compromise exploitation of CVE 2025-29824, a zero-day elevation of privilege vulnerability….
0
122
0
@splinter_code
Antonio Cocomazzi
3 months
RT @elad_shamir: NTLM relay is still a major threat and is now even easier to abuse. We just added new NTLM relay edges to BloodHound to he….
0
111
0
@splinter_code
Antonio Cocomazzi
3 months
RT @oct0xor: We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated s….
0
101
0
@splinter_code
Antonio Cocomazzi
3 months
RT @syrion89: Check out our new blog post!.
0
5
0
@splinter_code
Antonio Cocomazzi
3 months
RT @SBousseaden: new #elastic defend rules out :.- PPL bypass via ComDotNetExploit.- Execution via Windows-Run (trending delivery method IT….
0
22
0
@splinter_code
Antonio Cocomazzi
3 months
RT @decoder_it: Hey, we should really switch from NTLM to something like Kerberos, yet another good reason, right? cc @ShitSecure @splinte….
0
36
0
@splinter_code
Antonio Cocomazzi
4 months
RT @decoder_it: KrbRelayEx-RPC tool is out! 🎉.Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and re….
0
163
0
@splinter_code
Antonio Cocomazzi
4 months
RT @SBousseaden: Great work! few detection points: . - registry change "HKLM\\SOFTWARE\\Classes\\CLSID\\{0BE35203-8F91-11CE-9DE3-00AA004BB8….
0
35
0
@splinter_code
Antonio Cocomazzi
4 months
RT @decoder_it: Another simple standalone tool for creating machine accounts with custom password in Windows AD
0
33
0
@splinter_code
Antonio Cocomazzi
4 months
RT @decoder_it: Skiing with @cybersaiyanIT sticker is priceless 😀
Tweet media one
0
1
0
@splinter_code
Antonio Cocomazzi
4 months
RT @BushidoToken: @splinter_code This tweet was mentioned in the BlackBasta Leak bestflowers.json ( timestamp: 2023-10-23 16:17:02 ).
0
1
0
@splinter_code
Antonio Cocomazzi
5 months
RT @cybersaiyanIT: 🚀 #RomHack 2025 #callforpapers is OPEN! .Are you a #cybersecurity pro with a passion for sharing knowledge? .This is you….
0
7
0
@splinter_code
Antonio Cocomazzi
5 months
RT @dez_: Multi-Platform FINALDRAFT malware targeting government orgs. Outlook drafts for C2. We published a deep dive on the malware and….
0
46
0
@splinter_code
Antonio Cocomazzi
5 months
RT @decoder_it: Notes from the Field: My journey in trying to change Windows password in the most complex way, purely for fun, very little….
0
31
0
@splinter_code
Antonio Cocomazzi
5 months
RT @0x64616e: NTLM Relaying with DCOM cross-session activation over an external OXID resolver. This variant has the advantage over regular….
0
77
0
@splinter_code
Antonio Cocomazzi
5 months
RT @decoder_it: @splinter_code Are you sure they fixed? 🤨 This is the latest w11 insider canary .
Tweet media one
0
2
0
@splinter_code
Antonio Cocomazzi
5 months
RT @itswillis: Two new posts from @tiraniddo today:. on reviving a memory trapping primitive from his 2021 post.….
0
98
0
@splinter_code
Antonio Cocomazzi
5 months
Also kudos to my friend @decoder_it that was the first to spot those as Admin Protection bypasses 👇.
@decoder_it
Andrea Pierini
9 months
Administrator Protection, introduced in the latest Windows Insider Canary build, is a solid security enhancement. uhh. really?? can be bypassed with @splinter_code's clever SspiUacBypass tool. Check it out here:
Tweet media one
0
2
6
@splinter_code
Antonio Cocomazzi
5 months
Very interesting post by Microsoft about the internals of the new Admin Protection feature.It seems they have patched my SSPI UAC bypass based on NTLM as well as the Kerberos UAC bypass in which both were able to bypass AP as well.More details here 👇.
2
49
158