Labman

16.6K posts

Labman banner
Labman

Labman

@Amarjit_Labu

Lover of breaking things | Cybersec researcher with a wide taste in music genres!! https://t.co/AOHvviQE9r ||| chr°ᶰ1k |||

Ring3 making my way to Ring0 Katılım Temmuz 2009
1.6K Takip Edilen2.4K Takipçiler
Labman retweetledi
klez
klez@KlezVirus·
[RELEASE] Better late than never! Part 3 is out! Fantastic unwind information and where to find them. We went digging through .pdata, RTF Lookups, and a few ntdll internals that probably weren't meant to be touched. BYOUD dropping alongside. Enjoy 😉 klezvirus.github.io/posts/Byoud/
English
2
52
148
10.3K
Labman retweetledi
Kali Linux
Kali Linux@kalilinux·
Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…
Kali Linux tweet media
English
26
331
1.9K
112.4K
Labman retweetledi
Gavin K
Gavin K@atomiczsec·
proxy_enum – a BOF that enumerates Windows proxy configuration states: WinINET, WinHTTP, policy keys, environment variables, WPAD indicators, Chrome settings, and .NET defaultProxy values get checked. Shows how a host is likely to reach the network. Useful for finding egress paths during operations. BOF in Adrenaline Repo: github.com/atomiczsec/Adr…
Gavin K tweet media
English
3
14
75
3.5K
Labman retweetledi
Mr.Z
Mr.Z@zux0x3a·
I am releasing a new toolkit I built for IIS-based lateral movement and code execution within IIS worker pool process's memory. Phantom ASPX Loader & PhantomLink -- a two-part toolkit for reflectively loading native DLLs into IIS w3wp.exe worker processes via ASPX. github.com/zux0x3a/Phanto…
GIF
English
4
75
248
13.8K
Labman retweetledi
Andrea P
Andrea P@decoder_it·
When you try to harden Windows PrintNotify callbacks, you end up exposing vulnerabilities in other protocols like EPMAP that have been sitting around (or even more) for 20 years msrc.microsoft.com/update-guide/v…
English
0
14
64
5.4K
David
David@dmcxblue·
Happy Birthday Dill!!!
David tweet media
English
1
0
1
181
Labman retweetledi
Mayfly
Mayfly@M4yFly·
🔥🐉 New GOAD Lab: DRACARYS I’ve just released a new free lab environment on GOAD: DRACARYS. The challenge includes 3 VMs and the objective is simple: Start with no authentication and work your way up to Domain Admin. Have fun exploiting it! 🔥🐉 mayfly277.github.io/posts/Dracarys…
English
9
98
291
16.2K
Labman retweetledi
Nikhil Mittal
Nikhil Mittal@nikhil_mitt·
Giveaway - Our instructor-led advanced bootcamps for sharpening your Red Team skills start this weekend. Attacking and Defending Active Directory - Advanced Edition (CRTE) starts this Friday. Advanced Windows Tradecraft - Evasion Techniques for Red Teams (CETP) starts this Saturday. I am giving away one seat for each of the bootcamps. To participate, please Follow @nikhil_mitt and @AlteredSecurity, Like, Comment and Repost. We will announce the random winners on Wednesday. alteredsecurity.com/bootcamps?utm_… #RedTeam #Evasion
Nikhil Mittal tweet mediaNikhil Mittal tweet media
English
223
204
403
25.8K
Labman
Labman@Amarjit_Labu·
@trevorsaudi What's the use case? Are you streaming audio via this setup?
English
1
0
0
27
Labman retweetledi
BriPwn
BriPwn@BriPwn·
Your EDR just coerced itself. 🫠 Drop a crafted LNK → MsSense.exe makes a CreateFile call → machine account hands over its Net-NTLMv2 hash over WebDAV → relay to LDAP → Shadow Credentials or RBCD. No user interaction. No exotic exploit. Just vibes and a shortcut file. If you're running Microsoft Defender for Endpoint, this one is literally about you. 👀 Full attack + detection breakdown 👇 youtu.be/30Qiq_Gt_bA #purpleteam #MDE #NTLMcoercion #detectionengineering
YouTube video
YouTube
English
7
94
426
34.1K
Labman retweetledi
SpecterOps
SpecterOps@SpecterOps·
Chrome 137+ added a CNG wrinkle to App-Bound Encryption. @harmj0y + @tifkin_ walk through how Nemesis 2.2 handles it, automating DPAPI decryption from SYSTEM + user masterkeys through Chromekey1 to cookie/login recovery, w/ retroactive artifact linking. ghst.ly/3ZU2vZ7
English
0
27
43
5.6K