turbo_sec Profile Banner
turbo Profile
turbo

@turbo_sec

Followers
107
Following
3K
Media
3
Statuses
122

professional threat actor cosplayer

Joined May 2021
Don't wanna be here? Send us removal request.
@turbo_sec
turbo
7 days
RT @SpecterOps: 🐺 It's time to unleash the hounds! @HugovdToorn & @joeydreijer are bringing BloodHound wizardry to Red Team Village at #DEF….
0
3
0
@turbo_sec
turbo
11 days
RT @RedTeamVillage_: ā° 1 HOUR TO GO.🚨 Next Code Drop hits today at 4PM EDT!. Don’t miss your chance to grab a ticket to the Red Team Villag….
0
3
0
@turbo_sec
turbo
14 days
RT @_wald0: In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound:….
Tweet card summary image
specterops.io
TL;DR OpenGraph makes it easy to add new nodes and edges into BloodHound, but doesn’t design your data model for you. This blog post has everything you need to get started with proper attack graph...
0
43
0
@turbo_sec
turbo
14 days
RT @RedTeamVillage_: šŸŽÆ Mythic, Ghostwriter, Nemesis, and Tying the Room Together – @th3d00rman shows how these tools streamline red team op….
0
4
0
@turbo_sec
turbo
16 days
RT @SpecterOps: Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and….
Tweet card summary image
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
0
59
0
@turbo_sec
turbo
17 days
RT @SpecterOps: BloodHound v8.0 is here! šŸŽ‰. This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by….
0
60
0
@turbo_sec
turbo
21 days
RT @SpecterOps: .@_logangoins is dropping knowledge on ADWS exploitation. 🧠. Learn how attackers use the SOAP protocol for LDAP collection….
Tweet card summary image
specterops.io
Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments
0
34
0
@turbo_sec
turbo
1 month
RT @dazzyddos: Tried to write a short post on on MCP servers, how they can be vulnerable and some offensive cool MCP servers out there. ht….
Tweet card summary image
medium.com
Over the past few years, we have seen the massive growth of LLMs and AI agents across industries. These models are no longer just tools for…
0
12
0
@turbo_sec
turbo
1 month
RT @SpecterOps: šŸ”“ Red and blue teams, this one's for you. šŸ”µ. LudusHound bridges BloodHound Attack Paths with lab automation by creating a f….
0
78
0
@turbo_sec
turbo
2 months
RT @RedTeamVillage_: šŸ’„ Think you’ve got what it takes? Join Cyber Wargames at @defcon 33! A collection of infrastructure attack-defense cyb….
0
22
0
@turbo_sec
turbo
2 months
RT @SpecterOps: LLMs can expedite parts of the writing/editing process, but still require human oversight & guidance to provide accurate &….
0
11
0
@turbo_sec
turbo
2 months
RT @SpecterOps: Introducing the BloodHound Query Library! šŸ“š. @martinsohndk & @joeydreijer explore the new collection of Cypher queries desi….
Tweet card summary image
specterops.io
The BloodHound Query Library is a community-driven collection of BloodHound Cypher available at https://queries.specterops.io
0
112
0
@turbo_sec
turbo
2 months
RT @HackingLZ: And the most important part. "Please keep in mind that in its current state, the MCP server is just for use with Claude Desk….
0
21
0
@turbo_sec
turbo
2 months
Over the past few months I have been working on a BloodHound MCP. I documented my development process in a blog that was published today.
Tweet card summary image
specterops.io
Building an AI assistant for BloodHound: How I created an MCP that lets security teams analyze Active Directory environments through natural language instead of complex Cypher queries. Technical deep...
1
20
61