𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡

5K posts

𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 banner
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡

𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡

@CT_Hellcat

Global Security Team

Washington, USA Katılım Mart 2016
1K Takip Edilen396 Takipçiler
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Petr Beneš
Petr Beneš@PetrBenes·
Ever wanted to draw a triangle with OpenGL as a 2kb position-independent shellcode? No? Me neither. But you can do it anyway: github.com/wbenny/scfw
English
0
31
148
10.4K
Luci
Luci@GigelV41464·
Getting a Nighthawk agent running on increasingly obscurer platforms, Part 1 Enter DroidHawk, the Android open agent. It’s a .so file wrapped in an app that calls it. It was surprisingly easy to repurpose the sample code to run on Android!
Luci tweet media
English
6
18
114
17.8K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Giuseppe Calì
Giuseppe Calì@_gcali·
If you like VPN exploits as much as us, you're going to love this course Zeroshi is bringing to @_ringzer0! Marco will walk students into opening up edge devices for research, mapping their attack surface, finding vulns and building full exploit chains. ringzer0.training/countermeasure…
English
3
9
58
6.6K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Connor McGarr
Connor McGarr@33y0re·
[New @originhq blog+POC] No PPL? No problem! SecurityTrace, an undocumented ETW feature, restricts some AutoLogger traces to PPL only — yet we found this current design still allows non-PPL processes to consume from Threat-Intelligence as admin only! originhq.com/blog/securityt…
English
4
82
176
21.7K
IRIS C2
IRIS C2@C2IRIS·
At this point, Cobalt Strike is a worthless platform unless your goal is to emulate 13 year old Albanian ransomware gang members who are themselves using a cracked version of CS. In the real world, of high value targets, a firm that is red teaming them with CS is merely conducting a checkbox exercise. Can we just admit this already?
English
13
4
54
21.1K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
David
David@dmcxblue·
A short weekend read for anyone interested in the ANIMO (Azure Network Intel & Mission Ops) tool I've been working on throughout 2025. It documents a red team scenario with its capabilities and future development plans. If you'd like to send suggestions, phishing links or donations my DMs are open. #redteam dmcxblue.net/2026/01/04/ani…
English
1
5
53
3.5K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
db
db@whokilleddb·
New fav persistence method which works on Win11 25H2: Set the default key's value of HKCU\Software\Classes\CLSID\{18907f3b-9afb-4f87-b764-f9a4e16a21b8}\InprocServer32 to point to a malicious DLL and get shells from multiple programs even before a user logs in.
db tweet mediadb tweet media
English
10
127
836
77.1K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Another Pentest, another time the NetExec Veeam module didn't work properly. Sometimes SYSTEM impersonation is needed, sometimes it's flagged by AMSI. You need to know about alternatives. SharpVeeamDecryptor now supports v12 and PostgreSQL Veeam instances 😎 github.com/S3cur3Th1sSh1t…
S3cur3Th1sSh1t tweet media
English
4
46
240
14.4K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Arris Huijgen
Arris Huijgen@bitsadmin·
Because the last release of #NoPowerShell was 2 years ago and to celebrate the repo has 999 stars, I just merged DEV ➡️ MASTER and published Release 1.50 containing over 60 offensive cmdlets! 🥳 github.com/bitsadmin/nopo… See examples of some of the cmdlets below 👇
English
1
46
141
8.3K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Rtl Dallas
Rtl Dallas@RtlDallas·
Released my Cobalt Strike BOF for fork & run injection! Features Draugr stack spoofing, PPID spoofing, multiple execution methods, and indirect syscalls for enhanced OpSec. github.com/NtDallas/BOF_S…
Rtl Dallas tweet media
English
6
76
278
18.6K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157·
ADCSDevilCOM 📍 A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly. By: @AnonArtist8 github.com/7hePr0fess0r/A…
English
3
67
293
16K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
R.B.C.
R.B.C.@G3tSyst3m·
Here's my latest research. I decided to dive in to exploring Polymorphic PIC shellcode and walk the reader through the process of creating their own loader via x64 assembly code and Python. Thanks for your support and feedback as always. Enjoy! g3tsyst3m.com/shellcode/pic/…
English
2
38
162
9.3K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Steve S.
Steve S.@0xTriboulet·
I put a BOF loader in a BOF so that you can run BOFs from a BOF. If you've had issues getting a BOF to work with CS's BOF loader in the past, you now have a drop-in way to get a little bit more compatibility. github.com/0xTriboulet/In…
English
8
43
196
10.5K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
codewhisperer84
codewhisperer84@codewhisperer84·
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…
English
14
183
551
92.3K
Dhaval Gandhi
Dhaval Gandhi@dhavalg2006·
Happy to complete 6 yrs with Goanywhere MFT product from Fortra on file transfer/manage solution. Let me know if you need any support or guidance ☺️🙏 linkedin.com/in/dhaval-gand…
English
1
0
0
47
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…
English
140
903
3.2K
472.9K
𝐶𝑇-𝐻𝑒𝑙𝑙𝑐𝑎𝑡 retweetledi
Crusaders of Rust
Crusaders of Rust@cor_ctf·
Say hello to Eternal Tux🐧, a 0-click RCE exploit against the Linux kernel from KSMBD N-Days (CVE-2023-52440 & CVE-2023-4130) willsroot.io/2025/09/ksmbd-… Cheers to @u1f383 for finding these CVEs + the OffensiveCon talk from gteissier & @laomaiweng for inspiration!
English
11
200
758
81.4K