~ रीट्वीट किया
~
264 posts


~ रीट्वीट किया

@KottonJesse it’s gonna be heavily dependent on how they look. The issue now is that people have very high expectations that might not get fulfilled
English

@YuGiOh_TCG remember, ask to see a warrant if she wants to look at your hand
English

K9-17 Izuna is sniffing out the competition at YCS Anaheim!
Swing by the Anaheim Convention Center, Hall C, to see more incredible cosplay or test out the new Genesys format, or tune into the live stream at twitch.tv/officialyugioh…

English

@shiftingbyte @YGOPRODeck I played it because it's good against the new decks, especially when they are trying to play on T0, you can stop arthalion, winda, hollie sue, izuna/lupis with it, it's like more copies of droplet. It's also not bad when breaking boards
English
~ रीट्वीट किया

My personal #defcon33 highlights:
Better tools for GPO exploitation: media.defcon.org/DEF%20CON%2033…
Critical vulns in Zscaler and Netskope: media.defcon.org/DEF%20CON%2033…
Phishing on official Microsoft login: media.defcon.org/DEF%20CON%2033…
SSH vulnerabilities: media.defcon.org/DEF%20CON%2033…
English
~ रीट्वीट किया
~ रीट्वीट किया

The wait is over! Our stealthy Windows persistence technique (PhantomPersist) is now out!
Read the blog post here: blog.phantomsec.tools/phantom-persis…
English
~ रीट्वीट किया

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:
🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:
blog.redteam-pentesting.de/2025/reflectiv…
English
~ रीट्वीट किया

''Attacking an EDR - Part 1''
#infosec #pentest #redteam #blueteam
her0ness.github.io/2023-08-03-c2-…
English
~ रीट्वीट किया














