Dominic Chell 👻

16.1K posts

Dominic Chell 👻 banner
Dominic Chell 👻

Dominic Chell 👻

@domchell

Just your friendly neighbourhood red teamer @MDSecLabs | Creator of /r/redteamsec | https://t.co/3k3EBAZqGd | https://t.co/KwO2OwDOkl

Manchester, England Beigetreten Şubat 2009
547 Folgt17.8K Follower
Dominic Chell 👻 retweetet
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
Last year in Feb I was playing around with some hardware. I got this tp-link AC1200 which was the most purchased router at the time IIRC. I was cleaning up my place and I wanted to dust off and complete my old research before throwing it out. Pre-auth RCE, latest firmware 👀
b33f | 🇺🇦✊ tweet mediab33f | 🇺🇦✊ tweet media
English
6
8
80
7.2K
Dominic Chell 👻 retweetet
watchTowr
watchTowr@watchtowrcyber·
In 2025, we achieved pre-auth RCE against another solution in a ransomware gang favourite category. Today, we finally click publish. Join us as we walk through a chain of vulnerabilities we identified in BMC’s FootPrints ITSM solution. Enjoy! labs.watchtowr.com/thanks-itsms-t…
English
1
39
110
15.1K
Dominic Chell 👻 retweetet
Rob
Rob@Rob_Mulla·
In 2021 I mined 1.55 ETH into a crypto wallet. When I needed to access it recently my seed phrase didn't work in any standard tool. Turns out the wallet software (coinwallet) back in 2021 had a bug that gave people the WRONG SEED PHRASE! Anyone who created a wallet during that period can't access it by normal approaches. After weeks of forensics, I found the bug and recovered my ETH. Posting the full story and recovery code below! Full story: robmulla.substack.com/p/how-my-sons-… Repo: github.com/RobMulla/coins…
English
12
41
747
77.7K
Dominic Chell 👻
Dominic Chell 👻@domchell·
@retBandit Good luck mate - I’m sure you’ll kill the next one too 🙏 hopefully catch up with you for a beer this year 🍻
English
1
0
5
368
Chris Thompson
Chris Thompson@retBandit·
After 13 incredible years at IBM, I’m stepping away to start building something new. IBM has been a defining part of my life. I’m especially proud to have founded and grown the Adversary Simulation team and to have served as a Distinguished Engineer focused on AI and offensive security. What began as a small idea became one of the greatest red teams, pushing the boundaries of what real-world adversary simulation can look like - made possible by an exceptional group of people I learned from every day. I’m deeply grateful to the X-Force leadership and to the teammates, mentors, researchers, and operators who made the journey what it was. The team is in great hands and will continue to do important, impactful work. Looking ahead, I’m excited to focus on building what’s next - continuing to raise the bar for offensive cyber and exploring how AI can enable high sophistication offensive cyber operations and capabilities at a speed, scale, and intensity never before seen. It’s still early, but I’m looking forward to sharing more soon. I truly appreciate everyone who’s been part of the journey.
English
15
8
105
7.1K
Dominic Chell 👻 retweetet
Cody Thomas
Cody Thomas@its_a_feature_·
It's been a few months since I released a few short "Mythic Developer" videos. Before making more, I'd like to first get your feedback on the current ones. Please take a few min and fill this out so I can make sure you get the best content :) specterops.typeform.com/MythicDeveloper
GIF
English
0
8
12
2.4K
Dominic Chell 👻 retweetet
eleven red pandas
eleven red pandas@bytecodevm·
Research shows how Palo Alto Cortex XDR predefined BIOC behavioral rules can be decrypted and analyzed. By understanding rule logic and built-in exceptions, attackers can adapt techniques to evade detection and bypass behavioral protections. core-jmp.org/2026/03/decryp…
eleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet mediaeleven red pandas tweet media
English
0
53
162
13.4K
Dominic Chell 👻 retweetet
Melvin langvik
Melvin langvik@Flangvik·
This week’s video covers CVE-2026-24291, a Windows LPE nicknamed RegPwn by the team over at @MDSecLabs. As a part-time sloperator (Google it), I whipped up a quick RegPwn BOF, and in the video I demo it with Mythic and Apollo. Link below.
Melvin langvik tweet media
English
3
17
91
5.8K
Dominic Chell 👻 retweetet
b33f | 🇺🇦✊
b33f | 🇺🇦✊@FuzzySec·
I am releasing a reconstructed version of the cassowary CVE (CVE-2024-23222) that was disclosed as part of the Coruna leak. I also did some research with my AI assistants 😄 to reproduce a crash for the bug on x86_64 Linux github.com/FuzzySecurity/…
English
2
16
81
9.2K
Dominic Chell 👻 retweetet
joernchen
joernchen@joernchen·
RIP FX We collected some texts from the community in memory of @41414141 . You can find them here phenoelit.de/fx.html
English
1
22
61
10.9K
Dominic Chell 👻 retweetet
YungBinary
YungBinary@YungBinary·
New blog! We found an open directory attributed to #MuddyWater Iranian APT and found vulnerabilities/victims they've been targeting, red-team tools, and a loader that deploys a persistent variant of #Tsundere botnet - a MaaS sold by a Russian threat actor that is known for using #EtherHiding to store C2 addresses on the Ethereum blockchain. esentire.com/blog/muddywate…
YungBinary tweet mediaYungBinary tweet media
English
0
28
141
10.2K
Dominic Chell 👻 retweetet
Dirk-jan
Dirk-jan@_dirkjan·
The next public edition of my "Offensive Entra ID" course will take place from June 8th to 11th in The Hague! Tickets are now available via events.outsidersecurity.nl/entra-26-07/. Last time the tickets sold out in a few weeks, so don't wait too long if you want to secure a spot.
English
0
23
76
9.1K
Dominic Chell 👻 retweetet
vx-underground
vx-underground@vxunderground·
> be uk government > make web portal for doing taxes > companieshouse > click file for different company > enter company number > prompt for auth > hit back button 3 times > authentication bypassed > ??? > full information leaked > can modify company details for uk gov > ???
Dan Neidle@DanNeidle

I see some weird things but this takes the biscuit. A vulnerability in the Companies House website, that let anyone view the private dashboard of any one of the five million registered companies, see directors' personal details. And modify them.

English
77
630
7.6K
528.1K
Dominic Chell 👻 retweetet
Dan Neidle
Dan Neidle@DanNeidle·
I see some weird things but this takes the biscuit. A vulnerability in the Companies House website, that let anyone view the private dashboard of any one of the five million registered companies, see directors' personal details. And modify them.
English
382
1.6K
7.4K
1.6M
Dominic Chell 👻 retweetet
Co11ateral
Co11ateral@co11ateral·
Recently, a report on the APT28 toolkit was published. APT28 is associated with Russia’s GRU military intelligence service You can learn more about their recent tools and techniques here hunt.io/blog/operation… #apt #redteam #pentesting
English
0
14
61
5.9K
Dominic Chell 👻 retweetet
/ˈziːf-kɒn/
/ˈziːf-kɒn/@x33fcon·
Gdynia is calling. 🌊 The #x33fcon X training list is LIVE! 8 sessions announced: 🛠️ AI Sec: @abhinavbom 🛡️ Linux: @cr0nym ☁️ Azure: @matthieubjl & Paul 🕵️ eCrime: @jark 🦠 Malware: @DrCh40s & @t0nvi 🍏 macOS: @surya4n6 🏰 AD: @wil_fri3d & Guillaume 🔓 Physical: @tatramaco & Jiri 8/10 slots filled. 2 more surprises coming. 🤐 Grab your seat: x33fcon.com/#!training.md #Infosec #Hacking #x33fcon2026 #CyberSecurity
/ˈziːf-kɒn/ tweet media
English
0
10
26
2.5K
Dominic Chell 👻 retweetet
SteelCon
SteelCon@Steel_Con·
We've had quite a few submissions to our CFP so far, but we still need more. If you have something interesting to share with the community, get it submitted here: forms.gle/Sx4EZNRcS9zbCH…
English
1
10
12
2.1K