
Wil
@wil_fri3d
Followers
377
Following
266
Media
3
Statuses
156
Joined October 2017
RT @mpgn_x64: Thank you all for joining the Star Wars NetExec workshop at @_leHACK_ 2025 with @_zblurx & @wil_fri3d š„šŖ. 50 hackers, 1 roomā¦.
0
35
0
RT @Synacktiv: @wil_fri3d now rocking the stage at #leHACK to present his new tool GPOParser to automate Active Directory GPOs analysis, geā¦.
0
4
0
RT @Synacktiv: Our ninja @kalimer0x00 is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of theā¦.
0
24
0
RT @LazyTitan33: Excellent article from @Synacktiv detailing CVE-2025-33073. It's an easy peasy LPE on any server where SMB signing is notā¦.
0
95
0
RT @HackAndDo: I'm not sure everyone realizes it, but as it stands, if you have an Active Directory with default configurations, any machinā¦.
0
102
0
Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !.
Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d.
1
24
169
RT @Synacktiv: Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromiā¦.
0
262
0
RT @x33fcon: Got SCCM? You need to hear this! At #x33fcon, @kalimer0x00 will share insights from his SCCM research, including tradecraft frā¦.
0
7
0
RT @Synacktiv: š This week, @us3r777 & @__pierreg kick off our new Whitebox Vulnerability Research training! Students will dive into PHP, Jā¦.
0
14
0
RT @Synacktiv: Want to master cutting-edge techniques for attacking Azure? Join us this summer at @BlackHatEvents in Vegas for a deep diveā¦.
0
8
0
RT @unsigned_sh0rt: Thanks to @synacktiv's recent posts about Kerberos and recent PR's @_dirkjan 's .
0
29
0
RT @Synacktiv: In our latest article, @croco_byte and @SScaum demonstrate a trick allowing to make Windows SMB clients fall back to WebDavā¦.
0
95
0
RT @Synacktiv: We've just updated our training catalog to include the latest additions, including a brand new course on ransomware investigā¦.
0
9
0
RT @Synacktiv: Yay! Our offensive Azure training was accepted at BlackHat USA 2025 š„³ Can't wait to see you there and share cutting-edge tecā¦.
0
7
0
RT @Synacktiv: A few months ago, Microsoft released a critical patch for CVE-2024-43468, an unauthenticated SQL injection vulnerability inā¦.
0
64
0
RT @Synacktiv: You can now use LDAP/LDAPs protocols with the SOCKS proxy of ntlmrelayx thanks to the PR from @b1two_ (now merged upstream).ā¦.
0
124
0
RT @Synacktiv: You can now relay any protocol to SMB over Kerberos with and the latest PRs from @hugow_vincent. Thaā¦.
0
205
0
RT @Synacktiv: Oh, you didn't know? Cool kids are now relaying Kerberos over SMB š.Check out our latest blogpost by @hugow_vincent to discoā¦.
0
144
0