Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿

332 posts

Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 banner
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿

Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿

@au5_mate

Red Team

0x7F000001 Katılım Ocak 2022
266 Takip Edilen207 Takipçiler
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
5pider
5pider@C5pider·
spend some time rewriting stardust to be more minimalist and easier to use! I needed a generic minimal shellcode template that works for both x86 and x64 out of the box so I rewrote stardust to do so. It is now written in C++20 and utilizing some of its language features. The template can be used to easily write shellcode fast in a more modern and less painful way. The project can be compiled in release or debug mode, where as debug mode will just allow the use of DBG_PRINTF, which calls DbgPrint under the hood to print out strings to the currently attached debugger. There are more things i have added so consider checking it out. I removed global variable access since i no longer use it nor require it (went for diff design heh). If u still need that feature I would recommend to change the branch to "globals-support" where the old version is hosted. github.com/Cracked5pider/…
English
3
35
183
17.6K
MWM
MWM@MWM76·
@atrupar If I were Zelensky I would have told him to F off...
English
6
0
49
2.5K
Aaron Rupar
Aaron Rupar@atrupar·
"You've gotta be more thankful" -- remarkable scenes out of the White House as Trump and JD Vance team up to do Putin's bidding and demean Zelenskyy
English
505
756
4.1K
4.7M
kreep
kreep@kreepsec·
AI vs AI. We're really doing this. RedAgent is an LLM designed to jailbreak chatbots for pentesting & red teaming. So now we’ve got AI breaking AI, patching itself, and breaking again. Are we advancing tech or just setting up a whole new battlefield? 🔗 arxiv.org/abs/2407.16667
English
1
2
2
462
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
Octoberfest7
Octoberfest7@Octoberfest73·
I don't pay for premium, so please read the longform in the picture. TLDR: Cool new VS x86/x64 shellcode template from @alexsho71327477 at github.com/rbmm/SC_DEMO, he lives in Ukraine and is looking for remote work, help him make a connection if you can.
Octoberfest7 tweet media
English
4
37
136
10.5K
vx-underground
vx-underground@vxunderground·
Look at these dorks arguing over Rust and C compilation size
English
65
71
2.5K
178.7K
EvilMog® @mog.evil.af
EvilMog® @mog.evil.af@Evil_Mog·
I'm getting new business cards made, plain white with my contact info and logo embossed, found a provider, this is going to be cool, very subtle, very demure
English
3
0
22
1.5K
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
LP
LP@jotunvillur·
Don’t forget to leave a pcap and memory dump out for the SOC Analysts tonight.
English
1
25
128
10.1K
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
/dev/ttyS0
/dev/ttyS0@devttyS0·
Just in time for Christmas: a repository for decrypting many encrypted D-Link firmware images. Also integrated into Binwalk for auto-magic decryption & extraction. github.com/devttys0/delink
English
6
103
401
40.1K
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph 😃
English
6
119
348
36.1K
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿
@RedTeamTactics This has to be bait, or the most cowboy attempt at a red team op... Control group should have prevented this, and the Red Team failed basic OPSEC reqs in regard to attribution.
English
0
0
8
1.7K
Sean 🏴󠁧󠁢󠁳󠁣󠁴󠁿 retweetledi
Outflank
Outflank@OutflankNL·
New Blog Alert! 🚨 Introducing Early Cascade Injection, a stealthy process injection technique that targets Windows process creation, avoids cross-process APCs, and evades top-tier EDRs. Learn how it combines Early Bird APC Injection & EDR-Preloading: outflank.nl/blog/2024/10/1…
Outflank tweet media
English
4
184
428
36.2K
SkelSec
SkelSec@SkelSec·
People who are using hashcat not directly via the command line but with automation (web gui etc). What tool are you using?
English
8
2
25
7.5K