Patrick

3.4K posts

Patrick banner
Patrick

Patrick

@I_AM_1970

Principal Offensive Security Consultant. I burn like hot coffee. I’m kinda sweet like toffee. Look what this red team done taught me.

Ring0 Katılım Mayıs 2022
585 Takip Edilen658 Takipçiler
Patrick retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
New NetExec module: mssql_cbt🔥 Relaying to MSSQL can be a hidden gem when you are out of options. The only protection against relaying to MSSQL is to enforce Channel Binding Tokens (CBT). Thanks to @Defte_, NetExec now has a module that checks whether this CBT is required.
Alex Neff tweet media
Aurélien Chalot@Defte_

Following the blogpost about implementing the Channel Binding token for TDS.py on Impacket (sensepost.com/blog/2025/a-jo…), here is the module you can use to check whether or not CBT is required on MSSQL databases via NetExec github.com/Pennyw0rth/Net… 🔥🔥

English
0
66
268
34.4K
Patrick retweetledi
Kuba Gretzky
Kuba Gretzky@mrgretzky·
This is HUGE! 🪝🐟 Make sure to check out what @NathanMcNulty has cooked up! You can use webhooks with Evilginx Pro to send out the ESTSAUTH cookie, captured through phishing, and use Nathan's script to register a passkey for persistence automatically. 🔥 Nathan took a quick trip to the dark side... for science! 😂
Nathan McNulty@NathanMcNulty

Why yes, yes we can use ESTSAUTH captured from evilginx to automatically register a passkey

English
1
38
188
20.4K
Patrick retweetledi
Co11ateral
Co11ateral@co11ateral·
As Microsoft moves to disable NTLM in upcoming updates, hackers will shift toward Kerberos abuse. This can be done in several ways. PsMapExec can extract Kerberos tickets from memory and assigns them to variables for easier lateral movement. Defenders should at least enforce PowerShell logging and monitor what scripts are executed on workstations hackers-arise.com/powershell-for… @three_cube @_aircorridor @DI0256 #dfir #blueteam #redteam #pentest #ntlm #microsoft
Co11ateral tweet media
English
1
39
201
12.6K
Patrick retweetledi
Logisek
Logisek@logisekict·
🚀 AZexec: New Release Out Now! Big update with a ton of new offensive capabilities added: - Lockscreen enumeration: detect Windows lockscreen accessibility backdoors - Intune enumeration: enumerate Endpoint Manager–managed devices and configuration - Password spraying: two-phase workflow with validated usernames to reduce lockouts - Local authentication mode: target cloud-only (non-federated) accounts - OAuth2 delegation enumeration: identify consent-based impersonation paths - Remote command execution: execute commands on Azure VMs and devices - PI execution method: execute as another user via process injection - Empire execution: deploy Empire stagers for C2 access - Meterpreter execution: deliver Metasploit payloads - Spidering: enumerate and optionally download files from storage, VMs, and devices - File transfer: get and put files across VMs, Arc devices, and Azure storage - Credential extraction: dump credentials via SAM, LSA, NTDS, tokens, DPAPI, and more - github.com/Logisek/AZexec #Azure #RedTeam #OffensiveSecurity #CloudSecurity #Pentesting #PenTest #Offsec #Infosec #Logisek
English
1
35
136
7.3K
Patrick retweetledi
Logan D
Logan D@relay_royalty·
Introducing RelayKing. github.com/depthsecurity/… Blog: depthsecurity.com/blog/introduci… Automatically identify relay attack paths. No longer will you be left to manually detect a comprehensive inventory of all the relaying vectors on your engagements. It will detect signing/EPA settings on all protocols you specify, NTLM reflection CVEs, and WebDav WebClient presence. Then, produce a comprehensive report of the relaying vectors on the network in your preferred output format. This ensures that you report ALL vulnerable instances easily, without the need for manual patching together of results from various tools. Ideal usage is with a set of low-privilege AD credentials, but it also supports unauthenticated scanning (with far less coverage). See GitHub and the blog post for more details. Please note that there ARE bugs. The LDAP(S) detection has been annoying but SHOULD be mostly solid. If you get suspicious results from it, please report an issue on GitHub with the config RelayKing reported, versus the actual one. Enjoy!
English
3
86
213
18.2K
Patrick
Patrick@I_AM_1970·
I'll bite lol. Props to mentors Deviant, FC, Will S. and other OG red teamers out there who pwn hospitals, airports, banks, LE agencies, etc. all day long by showing up on site ready to roll. Failure rate is around 5% - simply not an option on this side of it. Only public, well-known TTPs shown for obvious reasons, but let me tell you COTS equipment can be devastating if used correctly.
Patrick tweet mediaPatrick tweet mediaPatrick tweet mediaPatrick tweet media
English
0
0
6
496
Chris Spehn
Chris Spehn@ConsciousHacker·
Still think red teaming is easy? Tell me about your attack path from initial access to objectives without triggering a detection. No assumed breach scenarios. Phish or GTFO.
English
17
4
101
28.1K
Patrick retweetledi
Hunter
Hunter@HunterMapping·
🚨Alert🚨 CVE-2026-24061 (CVSS 9.8): Critical GNU InetUtils telnetd Flaw Lets Attackers Bypass Login and Gain Root Access. 🧐Deep Dive :safebreach.com/blog/safebreac… 🔥PoC : github.com/vulhub/vulhub/… github.com/SafeBreach-Lab… 📊 30M+ Services are found on the hunter.how yearly. 🔗Hunter Link:hunter.how/list?searchVal… 👇Query HUNTER : protocol=="telnet" 📰Refer:thehackernews.com/2026/01/critic… openwall.com/lists/oss-secu…' #hunterhow #infosec #infosecurity #OSINT #Vulnerability
Hunter tweet mediaHunter tweet media
English
12
71
305
23.7K
Patrick retweetledi
Secorizon
Secorizon@secorizon·
Responder 3.2.2.0 is out! This new version comes with two new poisoners: RDNSS and DNSSL. Inject an IPv6 DNS server on all workstation present on your subnet. 2 new options were added: --rdnss and --dnssl yourdns.suffix.com These two new poisoners are highly effective :) For more info about DNSSL attack, refresh your memory here: g-laurent.blogspot.com/2021/12/respon…
Secorizon tweet mediaSecorizon tweet mediaSecorizon tweet media
English
5
61
233
15.4K
Patrick retweetledi
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
🛠️ SharePointDumper: PowerShell SharePoint extraction + auditing tool. ✅Enumerates all SharePoint sites/drives a user can access via Microsoft Graph, recursively downloads files, and logs every Graph + SharePoint HTTP request github.com/zh54321/ShareP…
English
0
50
178
9.9K
Patrick retweetledi
Secorizon
Secorizon@secorizon·
IPv6: Responder use to try to find a globally routable IPv6 (using a socket connect trick) first and only falls back to link-local on exception. Works great on the internet but this is backwards for internal pentesting scenarios. Now forcing bind on Local Link addresses, can be changed by using -6 IPv6_addr Now authentications are flying :)
English
2
24
137
10.1K
Patrick retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Weakpass version 4 was released sometime the last months, best for your password cracking needs: weakpass.com 🔥
English
2
18
93
7.3K
Patrick retweetledi
SpecterOps
SpecterOps@SpecterOps·
SCCM client push strikes again for hierarchy takeover! @_logangoins just dropped a new blog showing how WebClient doesn't need to be already running on site servers to coerce HTTP (WebDav) auth & enable NTLM relay to LDAP for SCCM takeover Read more ⤵️ ghst.ly/3NkEF5J
English
1
38
96
4.9K
Patrick retweetledi
Ricardo Ruiz
Ricardo Ruiz@RicardoJoseRF·
I just released SAMDump, a tool that extracts SAM and SYSTEM files via Volume Shadow Copy (VSS) API with optional exfiltration (local save or network transfer) and XOR obfuscation. Plus, it uses NT APIs for file operations github.com/ricardojoserf/…
English
0
42
118
6.5K
Patrick retweetledi
0x12 Dark Development
0x12 Dark Development@Salsa12__·
Evasive Remote Memory Write New Medium post, in this article, I’ve developed a custom technique for remotely writing arbitrary data (such as shellcode) into another process’s memory space without relying on the heavily monitored WriteProcessMemory API @s12deff/evasive-remote-memory-write-22e6ddc89517" target="_blank" rel="nofollow noopener">medium.com/@s12deff/evasi…
0x12 Dark Development tweet media
English
1
22
126
5.4K
Derek Devicemanager
Derek Devicemanager@IT_unhinged·
Someone just submitted a ticket asking why their laptop is running slow. I remote in. They have 3 Chrome windows open with 60+ tabs total. I close all but 5 tabs. Computer runs fine now. I write in the ticket: "Resolved - Optimized system memory allocation and cleared background processes." They reply: "Wow, thank you! What was wrong?" I reply: "Just some resource management issues. Should be good now." I didn't lie. I just used technical language to describe "you had way too many tabs open." If I say "close your tabs," they'll feel scolded. If I say "optimized memory allocation," they'll feel helped. Same result, better optics. Also, they'll probably open 60 tabs again next week and submit another ticket. And I'll "optimize" it again. This is called job security.
English
975
4.8K
74.2K
3.9M