mthcht

63 posts

mthcht

mthcht

@mthcht2

Threat Hunting - DFIR - Detection Engineering

Katılım Şubat 2023
351 Takip Edilen254 Takipçiler
mthcht
mthcht@mthcht2·
@novadoesit Thanks, looks like the limits have changed. I’ve updated the page
English
0
0
1
208
mthcht
mthcht@mthcht2·
LOLFSAAS Living off Free SaaS Hundreds of SaaS platforms with free tiers, documenting abuse surface, opsec risks, authent methods, C2 framework mappings, and operational limits. lolfsaas.github.io
English
7
121
571
38.3K
mthcht
mthcht@mthcht2·
@0xv1nx0 thanks for the feedback, I think it should be corrected now ?
English
0
0
0
491
v1n
v1n@0xv1nx0·
@mthcht2 Dont know if its just my browser, but when i hover over Share Link, and then move mouse, the text disappears on the pages #Asana" target="_blank" rel="nofollow noopener">lolfsaas.github.io/#Asana
English
1
0
2
2.1K
mthcht retweetledi
Unit 42
Unit 42@Unit42_Intel·
We’ve discovered a massive campaign using 30k-plus hostnames to distribute a #BrowserExtension named "OmniBar AI Chat and Search." This extension overrides the browser homepage and uses an attacker-controlled domain for #SearchHijacking. Details at bit.ly/4dbRVED
Unit 42 tweet mediaUnit 42 tweet mediaUnit 42 tweet mediaUnit 42 tweet media
English
2
80
269
31.3K
mthcht
mthcht@mthcht2·
Smart idea! payloads are embedded in the SSID field of Wi-Fi probe requests and captured by a sniffer. The probe requests are not logged, detection would require packet capture, which is not realistic at scale. github.com/V-i-x-x/WIFIAI…
English
0
0
0
148
mthcht retweetledi
HotCakeX ✡︎ סגול
HotCakeX ✡︎ סגול@CyberCakeX·
After Months of Development, FINALLY ready to share: Harden System Security🎉 ✅ Complete System Hardening ✅ Security Posture Analysis ✅ All-in-One Toolkit ✅ Built-in Intune support for Scalability ✅ Beautiful Modern UI ✅ CLI support github.com/HotCakeX/Harde… #Cyber #Windows
English
30
165
996
144.6K
mthcht retweetledi
Microsoft Threat Intelligence
Microsoft Threat Intelligence@MsftSecIntel·
Phishing actors are abusing complex routing scenarios and misconfigured spoof protections to spoof organizations’ domains and deliver emails that appear internally sent. msft.it/6010tFxSG This vector—which has seen increased visibility and use since May 2025—has enabled credential phishing campaigns tied to phishing-as-a-service (PhaaS) platforms like Tycoon2FA, using lures such as voicemails, shared documents, HR updates, and password resets. Microsoft has also observed this technique leveraged in financial scams. Successful credential compromise through phishing attacks may lead to data theft or business email compromise (BEC) attacks against the affected organization or partners and may require extensive remediation efforts, and/or lead to loss of funds in the case of financial scams. Tenants with Microsoft Exchange mail exchanger (MX) records pointing directly to Office 365 aren’t affected due to built‑in spoofing detections. Learn how phishing actors are leveraging these routing scenarios, how to identify this attack vector, and how proper configuration of spoof protections and third‑party connectors can reduce exposure in this Microsoft Threat Intelligence blog post:
English
3
46
129
35.9K
mthcht retweetledi
Who said what?
Who said what?@g0njxa·
A Windows #Clickfix alternative seen in the wild on a mass-spreading malware campaign bypassing traditional Win+R shortcut restrictions User is asked to open the Windows Power User menu (Win+X), open a Powershell terminal and paste and running a malicious Clickfix-style command
Who said what? tweet media
English
9
56
236
29.6K
mthcht retweetledi
Michael Weber
Michael Weber@BouncyHat·
Thanks to everyone who came out to see my talk! All of my code and the slides for my ChromeAlone presentation are available now at github.com/praetorian-inc…. If you're interested in developing malicious browser extensions give the code a look! #defcon #chromealone #malware
English
5
59
184
14.1K
mthcht retweetledi
inversecos
inversecos@inversecos·
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) inversecos.com/2022/05/how-to…
inversecos tweet media
IT Guy@T3chFalcon

Most red teamers ignore the clipboard. You can pull: – VPN creds – MFA tokens – AWS keys – Password manager dumps All from CTRL+C. Nobody checks it. Nobody clears it. But it’s always there. Use it. 👊🏾

English
23
312
1.6K
131K