jd

320 posts

jd banner
jd

jd

@c0kernel

Interested in books, mathematics, running, rock climbing, and infosec.

Minnesota 参加日 Aralık 2010
363 フォロー中138 フォロワー
jd がリツイート
Chris Thompson
Chris Thompson@_Mayyhem·
My SCCM BloodHound OpenGraph collector, ConfigManBearPig, is finally ready to share! It can enumerate all of the relay TAKEOVERs and a few CRED and ELEVATE techniques from Misconfiguration Manager with just a domain account. Let me know what you find! specterops.io/blog/2026/01/1…
English
5
77
180
13.8K
jd がリツイート
SpecterOps
SpecterOps@SpecterOps·
Stack spoofing isn’t dead. Hear from @klezvirus at #BHEU on how modern detection still breaks, and unveils the first CET-compliant stack spoofing framework. Learn more ➡️ ghst.ly/4izmuou
SpecterOps tweet media
English
2
21
46
5.1K
jd がリツイート
SpecterOps
SpecterOps@SpecterOps·
SCOM monitors critical systems, but insecure defaults make it a powerful attack vector. At #BHEU, @unsigned_sh0rt & @breakfix show how to abuse SCOM for credential theft, lateral movement, and domain escalation, plus how to defend it. ghst.ly/4aoggph
SpecterOps tweet media
English
0
31
72
24.3K
jd がリツイート
Yi Ma
Yi Ma@YiMaTweets·
All done with my new course on Deep Representation Learning this semester. All lecture slides and video recordings are now available at the book website: ma-lab-berkeley.github.io/deep-represent… We believe, with the book, they help students clarify basic concepts and principles of Intelligence.
Yi Ma tweet media
English
13
256
1.7K
100.7K
jd がリツイート
Tivadar Danka
Tivadar Danka@TivadarDanka·
The single most undervalued fact of linear algebra: matrices are graphs, and graphs are matrices. Encoding matrices as graphs is a cheat code, making complex behavior simple to study. Let me show you how!
Tivadar Danka tweet media
English
19
155
1.4K
93.9K
jd がリツイート
SpecterOps
SpecterOps@SpecterOps·
How do you model hybrid attack paths that span GitHub, GCP, Azure, and AD? @c0kernel has released SecretHound, a new BloodHound OpenGraph extension for secrets 🤫 — enabling modeling of “credential watering holes” across tech platforms. ghst.ly/4oZin6Y
English
0
14
38
4.3K
jd がリツイート
World of Science
World of Science@Science_TechTV·
The simplest way to visualize the set of numbers.
World of Science tweet media
English
20
222
1.4K
68.5K
jd がリツイート
HD Moore
HD Moore@hdmoore·
Just like chocolate and peanut butter, runZero and BloodHound are an amazing combination. Today we are introducing runZeroHound - an open source toolkit for bringing runZero Asset Inventory data into BloodHound attack graphs: runzero.com/blog/introduci…
HD Moore tweet mediaHD Moore tweet mediaHD Moore tweet mediaHD Moore tweet media
English
5
131
594
41K
jd がリツイート
SpecterOps
SpecterOps@SpecterOps·
Credential Guard was supposed to end credential dumping. It didn't. @bytewreck just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm
English
9
337
741
135.9K
jd がリツイート
Justin Elze
Justin Elze@HackingLZ·
As an attacker, I care more about the presence of canaries in an environment than about triggering them. Their existence lets me know they're either being automatically deployed (Cortex, etc.) or have someone who cares enough to build the environment this way and proceed accordingly. There is obviously a class of canaries where they're backed by server side monitoring, i.e., pulling a file from a file share and having the file server report the event, making it harder for an attacker to identify and avoid. However, the ones built into documents can almost always be avoided. I always suggest deploying a mix of self reporting canary files and server/EDR-backed ones, rather than just one type.
English
10
19
187
35.8K
jd がリツイート
SpecterOps
SpecterOps@SpecterOps·
BloodHound OpenGraph allows you to map attack paths across ANY platform. @jaredcatkinson spoke with @DarkReading during #BHUSA about how you can now connect the dots between Active Directory, GitHub repositories, and other sensitive assets. 👀: ghst.ly/4fAfwxQ
English
1
6
22
4.6K
jd がリツイート
Andy Robbins
Andy Robbins@_wald0·
It's easy to see "red" and "blue" as being against each other, that blue is constantly trying to keep up with red. The reality is that red and blue are on the SAME SIDE. Together, we're trying to keep up with emergent risks created by legacy tech, new tech, and common configs:
Andy Robbins tweet mediaAndy Robbins tweet media
Ciudad Autónoma de Buenos Aires, Argentina 🇦🇷 English
9
29
124
0