@spartan@infosec.exchange banner
@spartan@infosec.exchange

@001SPARTaN

Operator @SpecterOps. Speedskater, hacker. 99% caffeine. @[email protected]. He/him.

NT AUTHORITY\SYSTEM Katılım Nisan 2009
2K Takip Edilen3.4K Takipçiler
@[email protected] retweetledi
SpecterOps
SpecterOps@SpecterOps·
AtlasReaper enables red teamers to search for secrets and launch targeted social engineering attacks in Confluence and Jira. Use this tool to find passwords and sensitive files, or attach files and embed images to harvest Net-NTLMv1/v2 hashes. ghst.ly/3XupibU
English
0
29
87
8.3K
@[email protected] retweetledi
werdhaihai
werdhaihai@werdhaihai·
Today I'm releasing AtlasReaper, a .NET tool designed for red teamers to interact with Confluence and Jira via C2 agents. Discover secrets and launch targeted attacks. Check out the blogpost for more details: @werdhaihai/7a90ba33bf62" target="_blank" rel="nofollow noopener">medium.com/@werdhaihai/7a… Github Repo: github.com/werdhaihai/Atl…
English
2
92
216
21.6K
@[email protected] retweetledi
Cody Thomas
Cody Thomas@its_a_feature_·
It's official! Mythic 3.0 is LIVE! Check out the blog post about it here: posts.specterops.io/c2-and-the-doc…. Highlights include: rpfwds, graph groupings, jupyter notebook, custom webhooks, tags, docker updates, and an entirely new back end!
GIF
English
2
80
168
52.6K
@[email protected] retweetledi
Matt Hand
Matt Hand@matterpreter·
I've long been interested in how EDRs work under the hood and how we can apply a more evidence-based approach to evasion. I'm happy to announce that I've written a book covering these topics with @nostarch which is now available for preorder 🎉 nostarch.com/book-edr
English
45
331
1.1K
154.2K
@[email protected] retweetledi
SpecterOps
SpecterOps@SpecterOps·
We're excited to announce that we've secured $25M in funding to drive the next phase of expansion across the BloodHound Enterprise and FOSS platforms, security consulting services, research and more. Read more: ghst.ly/41BZuvf
SpecterOps tweet media
English
3
27
115
24.6K
@[email protected] retweetledi
Jared Atkinson
Jared Atkinson@jaredcatkinson·
@SpecterOps will be at NorthSec in full force. @zyn3rgy and @Icemoonhsv will be teaching our Red Team Operations course and @jsecurity101 and I will be teaching our new Malware Morphology for Detection Engineers workshop! We'd love to meet up and chat!
NorthSec@NorthSec_io

It’s no secret that @SpecterOps has some of the most popular FOSS for OffSec and shares tons of knowledge for free. For a 5th year in a row, we are happy to host one of their most famous training! 🗓️May 23-26 🏛️On site It sold out last time, so hurry up👉 nsec.io/training/2023-…

English
1
18
38
12.1K
@[email protected] retweetledi
Nick Powers
Nick Powers@zyn3rgy·
Interested in bypassing posture checks to access VPNs/federated services? Or want to learn to use patching and hooking techniques for subverting simple client-side controls? I'll be presenting @bsidesaustin on Friday, May 5th at 12pm CST. Come by if you're in the area!
Nick Powers tweet media
English
1
22
46
10.2K
@[email protected] retweetledi
inversecos
inversecos@inversecos·
Some exciting news! I am officially announcing my NEW training company XINTRA @XintraOrg - with the FIRST COURSE ready for sign-ups: 😈Attacking and Defending Azure/M365😈 The full course is available here: training.xintra.org I would love your support and follow <3
inversecos tweet media
English
63
301
1.4K
365.3K
@[email protected] retweetledi
SpecterOps
SpecterOps@SpecterOps·
We hope you're getting in some relaxation and spending time with loved ones! If, on the other hand, you want to escape for a little bit, you can take a few minutes to register one of our March trainings. You can even blame it on us, it's ok. ghst.ly/march2023
SpecterOps tweet media
English
1
7
18
6.5K
@[email protected] retweetledi
SpecterOps
SpecterOps@SpecterOps·
SpecterOps observes Election day as a company holiday. We are closed today to allow our employees every opportunity to cast their ballots. "Voting is not only our right - it is our power." -Loung Ung
English
0
8
33
0
@spartan@infosec.exchange
@[email protected]@001SPARTaN·
I guess I'll give Mastodon a try again. Feel free to ping me here: @spartan" target="_blank" rel="nofollow noopener">infosec.exchange/@spartan
English
0
0
0
0