SadPanda

1.8K posts

SadPanda banner
SadPanda

SadPanda

@sadpanda_sec

#RedTeamer #MMAJunkie #CarGuy #F1... Opinions are my own.

Thats a no for me dawg Katılım Mart 2015
644 Takip Edilen296 Takipçiler
SadPanda retweetledi
Marc Smeets
Marc Smeets@MarcOverIP·
What a week at @OutflankNL! > Release: Cobalt Strike Research Labs - research form the CS R&D team straight to OST customers > Release: InfraRed - automated deployment of RT infra > Nifty AI evasion research from @kyleavery added to OST > @fortraofficial acquires @_ZeroPointSec
English
4
10
54
2.3K
SadPanda retweetledi
kapla
kapla@LorenzoMeacci·
Thanks to @Octoberfest73, who spotted a mistake I made in my blog (which led to a never-ending rabbit hole of false assumptions about timer stacks xD), I was able to implement the InsomniacUnwinding technique in a full sleepmask based on Ekko by @C5pider github.com/kapla0011/Inso…
English
2
13
52
4.7K
SadPanda retweetledi
Gavin K
Gavin K@atomiczsec·
firewall_rule - a BOF to add, remove, or query Windows Firewall rules via the COM API (INetFwPolicy2) In highly monitored environments, just spawning process will create alerts. This tool is useful for helping pivot inside networks without that process creation find it here: github.com/atomiczsec/Adr…
Gavin K tweet media
English
2
18
99
7.6K
SadPanda retweetledi
Brett Hawkins
Brett Hawkins@h4wkst3r·
In this joint research project with @AndrewOliveau and @kulinacs we explored integrating LLMs into offensive workflows. The MCP servers and Gemini extensions from the blog can be found on the @ArmadinSecurity public GitHub ⬇️ 🔗 github.com/armadin-public
Andrew Oliveau@AndrewOliveau

🔥🤖Excited to share a new blog I co-authored with @h4wkst3r and @kulinacs - Automating the Operator: Integrating LLMs into Offensive Security armadin.com/blog-posts/aut… We show how LLMs make offensive work more operationally useful, introduce 2 new MCP servers, and an NTLM relaying Gemini extension POC

English
0
6
32
3.4K
SadPanda retweetledi
Andrew Oliveau
Andrew Oliveau@AndrewOliveau·
🔥🤖Excited to share a new blog I co-authored with @h4wkst3r and @kulinacs - Automating the Operator: Integrating LLMs into Offensive Security armadin.com/blog-posts/aut… We show how LLMs make offensive work more operationally useful, introduce 2 new MCP servers, and an NTLM relaying Gemini extension POC
English
1
39
111
10.5K
SadPanda retweetledi
Thariq
Thariq@trq212·
We just released Claude Code channels, which allows you to control your Claude Code session through select MCPs, starting with Telegram and Discord. Use this to message Claude Code directly from your phone.
English
1.7K
2.4K
25.8K
7.5M
SadPanda retweetledi
Panos Gkatziroulis 🦄
Panos Gkatziroulis 🦄@ipurple·
🛠️ Fritter - a heavily modified fork of Donut shellcode generator ✅ It generates position-independent shellcode for in-memory execution of VBScript, JScript, EXE, DLL, and .NET assemblies, but with a heavy focus on evasion and signature resistance github.com/0xROOTPLS/Frit…
English
0
33
120
5.8K
SadPanda retweetledi
Dirk-jan
Dirk-jan@_dirkjan·
It appears that Microsoft removed the discovery of all domains in a tenant through ACS, a technique that I shared at my BH/DC talks last summer (though probably not many people spotted the reference). I found it out during a live demo of course 🙃
Dirk-jan tweet media
English
4
40
239
17.2K
SadPanda retweetledi
Wietze
Wietze@Wietze·
🔥 macOS cmd-obfuscation with ArgFuscator New: over 60 os-native macOS binaries' command lines can now be obfuscated using #ArgFuscator, bypassing command-line based detections, such as this EDR trying to prevent credential dumping. 👉 Check it out: argfuscator.net
English
0
15
67
6.1K
SadPanda retweetledi
Daniel Bradley
Daniel Bradley@DanielatOCN·
Microsoft have finally patched another tenant domain enumeration loophole > ourcloudnetwork.com/microsoft-quie… Since Microsoft Patched the Get-FederationInformation endpoint from enumerating tenant domains, researchers and services like my TenantDomainFinder have been using a legacy ACS endpoint to enumerate all tenant domains. However, it looks like from today, Microsoft have quietly patched this exploit! #Entra #Microsoft #OSINT
Daniel Bradley tweet media
English
3
21
74
9.1K
SadPanda retweetledi
Mr.Z
Mr.Z@zux0x3a·
I am releasing a new toolkit I built for IIS-based lateral movement and code execution within IIS worker pool process's memory. Phantom ASPX Loader & PhantomLink -- a two-part toolkit for reflectively loading native DLLs into IIS w3wp.exe worker processes via ASPX. github.com/zux0x3a/Phanto…
GIF
English
4
74
250
14.6K