Wil Profile
Wil

@wil_fri3d

Followers
377
Following
266
Media
3
Statuses
156

Joined October 2017
Don't wanna be here? Send us removal request.
@wil_fri3d
Wil
5 days
RT @mpgn_x64: Thank you all for joining the Star Wars NetExec workshop at @_leHACK_ 2025 with @_zblurx & @wil_fri3d šŸ”„šŸŖ. 50 hackers, 1 room….
0
35
0
@wil_fri3d
Wil
6 days
RT @Synacktiv: @wil_fri3d now rocking the stage at #leHACK to present his new tool GPOParser to automate Active Directory GPOs analysis, ge….
0
4
0
@wil_fri3d
Wil
22 days
RT @Synacktiv: Our ninja @kalimer0x00 is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the….
0
24
0
@wil_fri3d
Wil
22 days
RT @LazyTitan33: Excellent article from @Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is not….
0
95
0
@wil_fri3d
Wil
23 days
RT @HackAndDo: I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machin….
0
102
0
@wil_fri3d
Wil
24 days
Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !.
@Synacktiv
Synacktiv
24 days
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.
1
24
169
@wil_fri3d
Wil
24 days
RT @Synacktiv: Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromi….
0
262
0
@wil_fri3d
Wil
1 month
RT @x33fcon: Got SCCM? You need to hear this! At #x33fcon, @kalimer0x00 will share insights from his SCCM research, including tradecraft fr….
0
7
0
@wil_fri3d
Wil
3 months
RT @Synacktiv: šŸš€ This week, @us3r777 & @__pierreg kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, J….
0
14
0
@wil_fri3d
Wil
4 months
RT @Synacktiv: Want to master cutting-edge techniques for attacking Azure? Join us this summer at @BlackHatEvents in Vegas for a deep dive….
0
8
0
@wil_fri3d
Wil
4 months
RT @unsigned_sh0rt: Thanks to @synacktiv's recent posts about Kerberos and recent PR's @_dirkjan 's .
0
29
0
@wil_fri3d
Wil
4 months
RT @Synacktiv: In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDav….
0
95
0
@wil_fri3d
Wil
5 months
RT @Synacktiv: We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investig….
0
9
0
@wil_fri3d
Wil
6 months
RT @Synacktiv: Yay! Our offensive Azure training was accepted at BlackHat USA 2025 🄳 Can't wait to see you there and share cutting-edge tec….
0
7
0
@wil_fri3d
Wil
6 months
RT @Synacktiv: A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability in….
0
64
0
@wil_fri3d
Wil
6 months
RT @Synacktiv: You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream).….
0
124
0
@wil_fri3d
Wil
7 months
RT @Synacktiv: You can now relay any protocol to SMB over Kerberos with and the latest PRs from @hugow_vincent. Tha….
0
205
0
@wil_fri3d
Wil
8 months
RT @Synacktiv: Oh, you didn't know? Cool kids are now relaying Kerberos over SMB šŸ˜.Check out our latest blogpost by @hugow_vincent to disco….
0
144
0
@wil_fri3d
Wil
9 months
RT @pentest_swissky: GITHUB ACTIONS EXPLOITATION: SELF HOSTED RUNNERS - @hugow_vincent.
0
7
0
@wil_fri3d
Wil
9 months
RT @HackingLZ: EKUwu Blog -
0
38
0