Andrew Oliveau

756 posts

Andrew Oliveau banner
Andrew Oliveau

Andrew Oliveau

@AndrewOliveau

Red Team @armadinsecurity♦️🤖

Katılım Haziran 2012
777 Takip Edilen3.3K Takipçiler
Sabitlenmiş Tweet
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
🔥Introducing a new Red Team tool - SessionHop: github.com/3lp4tr0n/Sessi… SessionHop utilizes the IHxHelpPaneServer COM object to hijack specified user sessions. This session hijacking technique is an alternative to remote process injection or dumping LSASS. Kudos to @tiraniddo for first discovering this years ago. Blue Team tip: Look for unusual child processes spawning from HelpPane.exe
English
5
138
396
33.9K
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
🔥🤖Excited to share a new blog I co-authored with @h4wkst3r and @kulinacs - Automating the Operator: Integrating LLMs into Offensive Security armadin.com/blog-posts/aut… We show how LLMs make offensive work more operationally useful, introduce 2 new MCP servers, and an NTLM relaying Gemini extension POC
English
1
24
61
4.8K
Andrew Oliveau retweetledi
@·
This year's #RSAC conversation on the AI threat landscape is unavoidable. The challenge of speed and scale has every CISO wondering how to keep pace. Book time with us to learn what Armadin is doing to meet this challenge. 244167924.hs-sites-na2.com/meet-with-arma…
 tweet media
English
0
1
2
274
Andrew Oliveau retweetledi
@·
I’m genuinely excited for all the new things that people are discovering and releasing in the ML / Offensive security space. It feels like the early days of red teaming again 🤘
English
3
7
58
10.4K
Andrew Oliveau retweetledi
@·
The Armadin team is heading to #RSAC2026 with red team briefings on AI-driven hyperattacks, an open Foundry space, and happy hours. See you in SF: armadin.com/blog-posts/con…
 tweet media
English
0
2
3
765
Andrew Oliveau retweetledi
Brett Hawkins
Brett Hawkins@h4wkst3r·
I am so thrilled to be a part of this team!! 🎉
English
0
1
20
1.8K
Andrew Oliveau retweetledi
@·
AI hasn't just changed cybersecurity, it's rewritten the rules. Attacks are faster, smarter, more relentless. Armadin has launched to meet this moment. Read more from @CNBC: cnbc.com/2026/03/10/kev…
English
0
2
9
967
Andrew Oliveau retweetledi
@·
Armadin launches today with the largest combined Seed + Series A in cybersecurity history. AI-driven hyperattacks are here and human-led defenses can't keep pace. Meet the ultimate attacker: a swarm of AI agents built to prove what's actually exploitable before it is.
 tweet media
English
3
18
45
14.1K
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
Over the last 7 months I’ve been working with an incredible team at Armadin. We’re building the future of offensive security with agentic AI. AI will accelerate cyber attacks, we’re already seeing it. And security needs to become autonomous to keep up. Excited to finally be out of stealth. armadin.com
English
3
5
37
4.4K
Andrew Oliveau retweetledi
@·
Exclusive: It took Anthropic’s most-advanced artificial intelligence model about 20 minutes to find its first Firefox browser bug during an internal test of its hacking prowess on.wsj.com/4rjrG2C
English
51
119
1.1K
122.9K
Andrew Oliveau retweetledi
@·
it’s raining bugs with Claude. seems like a fundamental shock to the ecosystem is about to occur
English
28
38
631
73.6K
Andrew Oliveau retweetledi
@·
Not news. But welcome to your future.
English
2
20
123
25.6K
Andrew Oliveau retweetledi
@·
LHE’s in the near future : - scope opens, hackers launch swarms - swarm does work - hackers update / tune skills - dupe fest, but also crit fest, - budget is blown on day 1 - no one hacks on site, - karaoke
English
7
6
96
8.2K
Andrew Oliveau retweetledi
@·
I once said: AI is not going to take your job as a pentester or bugbounty hunter. I was wrong.
English
95
50
764
119.6K
Andrew Oliveau retweetledi
@·
Hope to see you in Denver! V2 of SCCMHunter has some nice features including Kerberos support for the admin module now that Microsoft killed NTLM auth in the 2509 release
English
4
19
66
12.5K
Andrew Oliveau retweetledi
@·
🚀Our tool keycred for KeyCredentialLinks and Shadow Credential attacks now works with updated domain controllers again! It turns out, Microsoft violated their own specs. Try it out: github.com/RedTeamPentest…
 tweet media
English
2
80
238
28K
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
1. Called Amy from Marketing and kindly asked her to download and run my payload to ensure she mantains VPN access. The rest of the objectives were achieved undetected (MDE + CrowdStrike) 2. Called help desk and got their PRT via device code phishing. Got access to all their apps and completed objectives from there. Vishing is 💯 Just gotta get past that fear
GIF
English
0
0
6
505
Chris Spehn
Chris Spehn@ConsciousHacker·
Still think red teaming is easy? Tell me about your attack path from initial access to objectives without triggering a detection. No assumed breach scenarios. Phish or GTFO.
English
17
4
101
27.9K
Aurélien Chalot
Aurélien Chalot@Defte_·
Anyone know if Microsoft silently patch the Shadow Creds attack recently ? Looks like a computer object cannot write its own attribute anymore :D
English
11
30
133
43K