
watchdog
@w4tchdog2000
Followers
22
Following
1K
Media
6
Statuses
687
RT @SpecterOps: 👋 Say hello to Nemesis 2.0, a streamlined, Docker Compose-based platform that is laser-focused on file triage. After intro….
specterops.io
Nemesis 2.0 is a complete rewrite of the Nemesis file enrichment pipeline with a simplified and extensible architecture, new interface, and a focus on file triage and operator workflows.
0
31
0
RT @akaclandestine: GitHub - anderspitman/awesome-tunneling: List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and….
github.com
List of ngrok/Cloudflare Tunnel alternatives and other tunneling software and services. Focus on self-hosting. - anderspitman/awesome-tunneling
0
59
0
RT @whokilleddb: Published a blog/repo inspired by one of @MDSecLabs's research on VSCode extensions. In this repo, we put Rust and Javas….
github.com
Blog/Journal on how to backdoor VSCode extensions. Contribute to whokilleddb/sinister-vsix development by creating an account on GitHub.
0
30
0
RT @taviso: I just learned that OSC8 (hyperlinks) in Windows Terminal uses ShellExecute(). Excellent trolling potential for README files 😆….
0
86
0
RT @badsectorlabs: Ludushound shows the power of community driven innovation in cybersecurity. @bagelByt3s created an awesome tool to conve….
specterops.io
LudusHound is a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via the Ludus framework for controlled testing.
0
92
0
RT @BlackArrowSec: Are you aware that WebDAV and search-ms can trick users into executing remote files as if they were local?. Our #ThreatH….
0
5
0
RT @x33fcon: #x33fcon 2025 talks: @Oddvarmoe - Redteam Chronicles: A C2 Story - Outlook's One-Setting Wonder > http….
0
24
0
RT @profundisio: We don't delete DNS records, ever. That subdomain pointing to 1.2.3.4 six months ago? Still in our dataset. Perfect for….
0
3
0
RT @mpgn_x64: Thank you all for joining the Star Wars NetExec workshop at @_leHACK_ 2025 with @_zblurx & @wil_fri3d 🔥🪐. 50 hackers, 1 room….
0
34
0
RT @xbz0n: Mythic C2 with redirectors & EarlyBird injection beats Windows 11’s Defender - signature & behavior. Dive in: .
xbz0n.sh
Let's talk about building C2 infrastructure that actually works in the real world. Most red teamers think they can just spin up a Cobalt Strike server and ca...
0
59
0
RT @evstykas: As promised today as my brithday gift we are going to (check notes. ) access the infrastructure of Quad7 (or 7777) a monitor….
0
31
0
RT @malmoeb: I successfully tested a LSASS dumping technique on a Windows 10 lab machine, which we encountered on a recent Incident Respons….
0
84
0
RT @SpecterOps: Introducing the BloodHound Query Library! 📚. @martinsohndk & @joeydreijer explore the new collection of Cypher queries desi….
specterops.io
The BloodHound Query Library is a community-driven collection of BloodHound Cypher available at https://queries.specterops.io
0
113
0
RT @d1rkmtr: 🚨 I'm looking for a Job 🚨. 🐚 Backdooring a VSCode Project via .vscode/tasks.json. This technique is used for initial access ta….
0
17
0
RT @mrd0x: Finally had some time to publish these blogs. Enjoy!. Spying On Screen Activity Using Chromium Browsers..
0
185
0
RT @xaitax: 🔓 Big update! Chrome App-Bound Decryption v0.9 released!. 🛡️ Get your Cookies, Passwords, Payments, etc., from Chrome/Edge/Brav….
0
40
0
RT @YuG0rd: 🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability.It allows….
0
373
0
RT @yudasm_: What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution?.We explored process injection using….
blog.fndsec.net
What happens when you skip memory allocation, skip writing, and weaponize thread context alone? This post explores a new class of process injection that lives entirely in the execution layer — no a…
0
77
0
RT @pentest_swissky: RedExt — Offensive Chrome extension framework.
medium.com
RedExt: Exploring Chrome Extensions for Red Team Operations
0
41
0