Init1Security

181 posts

Init1Security

Init1Security

@init1security

Elevating security with expert offensive strategies

Long Beach Katılım Ekim 2024
63 Takip Edilen503 Takipçiler
Ryan
Ryan@Haus3c·
yall ever dump lsass with Steam?
Ryan tweet media
English
5
2
27
4.5K
Init1Security
Init1Security@init1security·
We have released WARDEN in beta testing, if anyone wants to hammer the AI and our very meticulous prompts please go ahead, reach out if you encounter any errors!! #redteam warden.init1security.com
English
0
1
2
521
David
David@dmcxblue·
I am back in beautiful Mexico, and with some down time here and there (when my son sleeps). I get the chance to work on a cool project that reminded me of Veil-Evasion a framework that was the big on payload generation and evasion our internal tooling for @init1security and to give some reference to Mexico I named it Nahual. Utilizing different "Gates" techniques, syscalls methods, encryption and evasion methods they can be activated with a simple flag: '--key-username "demo" --encryption aes, etc, etc.' it's a really big project that I've been wanting to tackle to solve and automate my evasion issues, has been with great success (sometimes), I can use full meterpreter (highly signatured) shells and metasploit as my C2. #redteam
David tweet media
English
1
1
14
2.1K
Init1Security
Init1Security@init1security·
A great project!! Currently in development!.
David@dmcxblue

I am back in beautiful Mexico, and with some down time here and there (when my son sleeps). I get the chance to work on a cool project that reminded me of Veil-Evasion a framework that was the big on payload generation and evasion our internal tooling for @init1security and to give some reference to Mexico I named it Nahual. Utilizing different "Gates" techniques, syscalls methods, encryption and evasion methods they can be activated with a simple flag: '--key-username "demo" --encryption aes, etc, etc.' it's a really big project that I've been wanting to tackle to solve and automate my evasion issues, has been with great success (sometimes), I can use full meterpreter (highly signatured) shells and metasploit as my C2. #redteam

English
0
0
1
247
Init1Security
Init1Security@init1security·
We added a C2 interface and it’s looking solid. It can load CNA scripts similar to Cobalt Strike, but since PickleC2 is written in Python, we use a Python wrapper for them. Still a pretty nice setup. #redteam
Init1Security tweet media
English
0
5
70
5.1K
Init1Security
Init1Security@init1security·
We're working on malwareless lateral movement techniques, and what better scripts to handle these methods than Impacket? One of them is their reg[.]py script, which allows us to modify registry keys remotely and gain a semi-interactive shell, keeping the naming convention "regexec" is one of those tools!. #redteam
GIF
English
0
5
32
2.5K
Init1Security
Init1Security@init1security·
A new tool in our arsenal: DotBlind, a Python script that applies sandbox evasion, anti-debug techniques, AES and XOR encryption to compiled .NET binaries for evasion, it's looking very promising, testing with execute-assembly should be a big win, currently dropping to disk and executing is functional. 🫡 #redteam
English
5
19
125
9.7K
Init1Security
Init1Security@init1security·
@bohops As always all the cool talks are outside the U.S., jk,jk. Congrats super interesting topic as always!
English
1
0
0
49
bohops
bohops@bohops·
COM is a gift that keeps on giving.. yet another relic of the Windows OS that is unlikely to go away in the near future.
Security BSides Prague@bsidesprg

🚨 Speaker Announcement – #BSidesPrague2026 🎤 Marco Balzarin Abusing the Ordinary: New COM-Based Windows Attack Vectors Explore Windows COM from an offensive angle—new hunting methods and undocumented techniques for stealthy code execution via legitimate components. #Bsides

English
2
9
73
6.6K
Init1Security
Init1Security@init1security·
Excited to deliver our first Red Team workshop in Spanish for Mexico! This course is customized to provide a solid understanding of Red Teaming and to train offline LLMs for Red Team operations, while still working with C2 and following the attack chain: Initial Access techniques, Persistence, Privilege Escalation, and more!. 🇲🇽 #redteam
Init1Security tweet media
English
0
3
26
1.8K
Rasta Mouse
Rasta Mouse@_RastaMouse·
I'm going to legit try and make the jump to Linux as my daily driver. Wish me luck, fam.
English
20
0
114
16.2K
Init1Security
Init1Security@init1security·
Tokens are incredibly powerful in terms of scope and access. Get the correct one and your access becomes extraordinary. With ANIMO, we try to automate this and use a seamless approach so users can easily obtain and use these tokens. #redteam
Init1Security tweet media
English
0
0
8
1.4K