Lsec

813 posts

Lsec banner
Lsec

Lsec

@lsecqt

Doing ethical hacking / red teaming / penetration testing and offensive coding videos. I am OSCP / OSEP / Vulnerability Researcher / Youtuber

Subscribe to my channel ⬇️ Katılım Ekim 2021
161 Takip Edilen4.5K Takipçiler
Lsec retweetledi
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
apimspray - a specialized Entra ID Passwordspraying Toolkit designed for authorized security research and Red Teaming. It utilizes Azure API Management (APIM) gateways as a distributed, rotating proxy layer for IP Rotating github.com/crtvrffnrt/api…
English
0
20
85
4.5K
Lsec
Lsec@lsecqt·
Let's continue the series of building a vulnerable Active Directory environment. I will today try my best to install OPNSense firewall live, on twitch (twitch.tv/lsecqt) at 19:00 EEST. Feel welcomed to drop your questions
English
1
0
11
794
Lsec
Lsec@lsecqt·
My Mythic C2 agent now has a stable Invoke-BOF support. Thanks to my Patreons for the support.
Lsec tweet media
English
0
0
84
2.6K
Lsec
Lsec@lsecqt·
Just vibe coded a Windows TCP port forwarder in C Features: • IP whitelisting for filtering • 100 concurrent connections • Verbose mode for debugging • Low-latency optimizations Perfect for local dev, network bridging, and relaying attacks 🚀 github.com/lsecqt/PortFor…
English
1
29
83
4.1K
Lsec
Lsec@lsecqt·
Drop your pre-stream questions here:
English
0
0
2
260
Lsec
Lsec@lsecqt·
I want to completely rebuild my Active Directory Lab and make it intentionally vulnerable. I will stream the entire process starting tomorrow at around 7pm (EEST). As always, on Twitch: twitch.tv/lsecqt
English
1
0
7
565
Lsec retweetledi
☣️ Mr. The Plague ☣️
☣️ Mr. The Plague ☣️@DotNetRussell·
If you like BloodHound and AD Hacking let me introduce you to BloodBash No web front end No neo4j No complexity Collect your AD artifacts with Sharphound Run `BloodBash ./pathToSharphoundOutput` That's it! github.com/DotNetRussell/…
☣️ Mr. The Plague ☣️ tweet media
English
7
46
237
26.7K
Lsec retweetledi
Gavin K
Gavin K@atomiczsec·
this cool tool by @lsecqt enumerates windows terminal services sessions; ported it to a BOF and added some more features for accuracy (session LUIDs) github link: github.com/atomiczsec/Adr…
Gavin K tweet media
Lsec@lsecqt

Yesterday I ran a livestream testing SessionHop - abusing specific COM objects to execute C2 actions in the context of other users. github.com/3lp4tr0n/Sessi… However, no session enumeration. So I built SessionView, tool to identify sessions github.com/lsecqt/Session… Video is on YT!

English
0
3
12
842
Lsec
Lsec@lsecqt·
Yesterday I ran a livestream testing SessionHop - abusing specific COM objects to execute C2 actions in the context of other users. github.com/3lp4tr0n/Sessi… However, no session enumeration. So I built SessionView, tool to identify sessions github.com/lsecqt/Session… Video is on YT!
English
1
50
174
10.3K
Lsec
Lsec@lsecqt·
I built a lightweight C# tool designed to enumerate local administrator access across an internal network, strictly from the context of the current user. Repository and stream upload links are below. Repository: github.com/lsecqt/Find-Ad… Uploaded Stream: youtu.be/3Ee9mGhKmvY
YouTube video
YouTube
English
1
18
66
10.8K
Lsec retweetledi
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecure·
Multiple people posted today in the morning about backdoored Github repositories, such as for React4Shell Scan repositories or an WSUS Exploits. This one for example is backdoored and will compromise your system once you run it: - github.com/th1n0/CVE-2025… For fun, I analysed the malware today. Turns out its dowloading a custom HTA via mshta.exe from the webserver https://py-installer[dot]cc. This is ~1600 lines of code heavily obfuscated and not flagged by AV or EDRs tested. I told AI to analyse the payload and to create a C2-Server for me. It refused. I told AI to analyse the malware and it did. After that, the barrier was gone and it provided me a fully featured C2-Server side framework to handle this payload for offensive purposes on my own. Of course - only in a simulated environment for analysis and testing purposes 😊 Well, after~3 hours of vibe coding we now have a new C2-Framwork with ~12 modules, we only need to adjust this HTA obfuscated C2-Server domain or URL and we can use the public implant with our own Server-Component. Thats the age of AI, normally it would have taken hours for me to manually analyse this malware!
S3cur3Th1sSh1t tweet mediaS3cur3Th1sSh1t tweet media
English
6
59
256
23.8K
Lsec
Lsec@lsecqt·
It was a pleasure to contribute to the Mythic C2 framework. The webhook container now support not only Slack, but Discord alerting as well. github.com/MythicC2Profil…
English
0
0
9
852
Lsec
Lsec@lsecqt·
I am happy to present the latest blogpost I was working on. It is about enumerating and attacking MSSQL databases from both external and internal perspective. Hope you learn something from it and as always, any feedback is welcomed! r-tec.net/r-tec-blog-mss…
English
1
37
90
6.7K
Lsec
Lsec@lsecqt·
My SCShell lateral movement stream is available now on my channel: youtube.com/watch?v=zLre6L… Hope you learned something new, let me know what to feature next.
YouTube video
YouTube
English
0
3
10
1.9K
Lsec
Lsec@lsecqt·
Did you know that you can invoke VBA macros directly from PowerShell? Mind blowing right? Shout out to this blogpost: cybereason.com/blog/dcom-late…
English
0
7
15
1K
Lsec
Lsec@lsecqt·
Let's shoot a Sunday night stream, tomorrow at 20:00 EEST. I am planning to do some lateral movement from C2, is there anything you would want to also see? Drop your thoughts below.
English
0
0
6
533
Lsec
Lsec@lsecqt·
The Ligolo-NG stream is now LIVE! Did you know that Ligolo-NG has a builtin Web UI that lets you manage everything? Hope it's useful and you learn something new. Any feedback is much welcomed! (youtu.be/-enTMD4_3D8)
YouTube video
YouTube
English
0
2
14
1.2K