
turbo
@turbo_sec
Followers
107
Following
3K
Media
3
Statuses
122
RT @SpecterOps: šŗ It's time to unleash the hounds! @HugovdToorn & @joeydreijer are bringing BloodHound wizardry to Red Team Village at #DEFā¦.
0
3
0
RT @RedTeamVillage_: ā° 1 HOUR TO GO.šØ Next Code Drop hits today at 4PM EDT!. Donāt miss your chance to grab a ticket to the Red Team Villagā¦.
0
3
0
RT @SpecterOps: MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without toā¦.
specterops.io
TL;DR MSSQLHound is a standalone PowerShell collector that adds 7 new nodes and 37 new MSSQL attack path edges to BloodHound using the new OpenGraph feature that was released in version 8.0. This...
0
51
0
RT @_wald0: In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound:ā¦.
specterops.io
TL;DR OpenGraph makes it easy to add new nodes and edges into BloodHound, but doesnāt design your data model for you. This blog post has everything you need to get started with proper attack graph...
0
43
0
RT @RedTeamVillage_: šÆ Mythic, Ghostwriter, Nemesis, and Tying the Room Together ā @th3d00rman shows how these tools streamline red team opā¦.
0
4
0
RT @SpecterOps: Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation andā¦.
specterops.io
How Entra Connect and Intune can be abused via userCertificate hijacking to bypass conditional access and compromise hybrid domains
0
59
0
RT @SpecterOps: BloodHound v8.0 is here! š. This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management byā¦.
0
60
0
RT @SpecterOps: .@_logangoins is dropping knowledge on ADWS exploitation. š§ . Learn how attackers use the SOAP protocol for LDAP collectionā¦.
specterops.io
Learn how to perform stealthy recon of Active Directory environments over ADWS for Red Team Assessments
0
34
0
RT @RedTeamVillage_: Thanks to our #DC33 sponsors!.@Amazon @FlareSystems @KindoAI @WKL_cyber @AlteredSecurity #HTX.@specterops @corelight_iā¦.
0
9
0
RT @dazzyddos: Tried to write a short post on on MCP servers, how they can be vulnerable and some offensive cool MCP servers out there. htā¦.
medium.com
Over the past few years, we have seen the massive growth of LLMs and AI agents across industries. These models are no longer just tools forā¦
0
12
0
RT @SpecterOps: š“ Red and blue teams, this one's for you. šµ. LudusHound bridges BloodHound Attack Paths with lab automation by creating a fā¦.
0
78
0
RT @badsectorlabs: Ludushound shows the power of community driven innovation in cybersecurity. @bagelByt3s created an awesome tool to conveā¦.
specterops.io
LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via the Ludus framework for controlled testing.
0
92
0
RT @RedTeamVillage_: š„ Think youāve got what it takes? Join Cyber Wargames at @defcon 33! A collection of infrastructure attack-defense cybā¦.
0
22
0
RT @SpecterOps: LLMs can expedite parts of the writing/editing process, but still require human oversight & guidance to provide accurate &ā¦.
0
11
0
RT @SpecterOps: Introducing the BloodHound Query Library! š. @martinsohndk & @joeydreijer explore the new collection of Cypher queries desiā¦.
specterops.io
The BloodHound Query Library is a community-driven collection of BloodHound Cypher available at https://queries.specterops.io
0
112
0
RT @f1rstm4tter: A single 1.4GB file exposed credentials for 110+ universities. Terra Dotta incident included encode keys enabling completeā¦.
ryanmroth.com
I discovered a critical Terra Dotta data exposure affecting hundreds of universities: publicly accessible credentials, SEVIS immigration data, and authentication bypasses. The vendor removed file...
0
2
0
RT @HackingLZ: And the most important part. "Please keep in mind that in its current state, the MCP server is just for use with Claude Deskā¦.
0
21
0
RT @SpecterOps: Exploring Model Context Protocol servers? @turbo_sec's new MCP server allows Claude Desktop to access & analyze data contaiā¦.
specterops.io
Building an AI assistant for BloodHound: How I created an MCP that lets security teams analyze Active Directory environments through natural language instead of complex Cypher queries. Technical deep...
0
28
0
The code for my project can be found on my GitHub.
github.com
A Model Context Protocol (MCP) server to converse with data in Bloodhound - mwnickerson/bloodhound_mcp
0
7
10
Over the past few months I have been working on a BloodHound MCP. I documented my development process in a blog that was published today.
specterops.io
Building an AI assistant for BloodHound: How I created an MCP that lets security teams analyze Active Directory environments through natural language instead of complex Cypher queries. Technical deep...
1
20
61