๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก

5K posts

๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก banner
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก

๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก

@CT_Hellcat

Global Security Team

Washington, USA Sumali Mart 2016
1K Sinusundan396 Mga Tagasunod
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Petr Beneลก
Petr Beneลก@PetrBenesยท
Ever wanted to draw a triangle with OpenGL as a 2kb position-independent shellcode? No? Me neither. But you can do it anyway: github.com/wbenny/scfw
English
0
31
148
10.4K
Luci
Luci@GigelV41464ยท
Getting a Nighthawk agent running on increasingly obscurer platforms, Part 1 Enter DroidHawk, the Android open agent. Itโ€™s a .so file wrapped in an app that calls it. It was surprisingly easy to repurpose the sample code to run on Android!
Luci tweet media
English
6
18
114
17.8K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Giuseppe Calรฌ
Giuseppe Calรฌ@_gcaliยท
If you like VPN exploits as much as us, you're going to love this course Zeroshi is bringing to @_ringzer0! Marco will walk students into opening up edge devices for research, mapping their attack surface, finding vulns and building full exploit chains. ringzer0.training/countermeasureโ€ฆ
English
3
9
58
6.6K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Connor McGarr
Connor McGarr@33y0reยท
[New @originhq blog+POC] No PPL? No problem! SecurityTrace, an undocumented ETW feature, restricts some AutoLogger traces to PPL only โ€” yet we found this current design still allows non-PPL processes to consume from Threat-Intelligence as admin only! originhq.com/blog/securitytโ€ฆ
English
4
82
176
21.7K
IRIS C2
IRIS C2@C2IRISยท
At this point, Cobalt Strike is a worthless platform unless your goal is to emulate 13 year old Albanian ransomware gang members who are themselves using a cracked version of CS. In the real world, of high value targets, a firm that is red teaming them with CS is merely conducting a checkbox exercise. Can we just admit this already?
English
13
4
54
21.1K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
David
David@dmcxblueยท
A short weekend read for anyone interested in the ANIMO (Azure Network Intel & Mission Ops) tool I've been working on throughout 2025. It documents a red team scenario with its capabilities and future development plans. If you'd like to send suggestions, phishing links or donations my DMs are open. #redteam dmcxblue.net/2026/01/04/aniโ€ฆ
English
1
5
53
3.5K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
db
db@whokilleddbยท
New fav persistence method which works on Win11 25H2: Set the default key's value of HKCU\Software\Classes\CLSID\{18907f3b-9afb-4f87-b764-f9a4e16a21b8}\InprocServer32 to point to a malicious DLL and get shells from multiple programs even before a user logs in.
db tweet mediadb tweet media
English
10
127
836
77.1K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
S3cur3Th1sSh1t
S3cur3Th1sSh1t@ShitSecureยท
Another Pentest, another time the NetExec Veeam module didn't work properly. Sometimes SYSTEM impersonation is needed, sometimes it's flagged by AMSI. You need to know about alternatives. SharpVeeamDecryptor now supports v12 and PostgreSQL Veeam instances ๐Ÿ˜Ž github.com/S3cur3Th1sSh1tโ€ฆ
S3cur3Th1sSh1t tweet media
English
4
46
240
14.4K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Arris Huijgen
Arris Huijgen@bitsadminยท
Because the last release of #NoPowerShell was 2 years ago and to celebrate the repo has 999 stars, I just merged DEV โžก๏ธ MASTER and published Release 1.50 containing over 60 offensive cmdlets! ๐Ÿฅณ github.com/bitsadmin/nopoโ€ฆ See examples of some of the cmdlets below ๐Ÿ‘‡
English
1
46
141
8.3K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Rtl Dallas
Rtl Dallas@RtlDallasยท
Released my Cobalt Strike BOF for fork & run injection! Features Draugr stack spoofing, PPID spoofing, multiple execution methods, and indirect syscalls for enhanced OpSec. github.com/NtDallas/BOF_Sโ€ฆ
Rtl Dallas tweet media
English
6
76
278
18.6K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
7h3h4ckv157
7h3h4ckv157@7h3h4ckv157ยท
ADCSDevilCOM ๐Ÿ“ A C# tool for requesting certificates from ADCS using DCOM over SMB. This tool allows you to remotely request X.509 certificates from CA server using the MS-WCCE protocol over DCOM and It bypasses the traditional endpoint mapper requirement by using SMB directly. By: @AnonArtist8 github.com/7hePr0fess0r/Aโ€ฆ
English
3
67
293
16K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
R.B.C.
R.B.C.@G3tSyst3mยท
Here's my latest research. I decided to dive in to exploring Polymorphic PIC shellcode and walk the reader through the process of creating their own loader via x64 assembly code and Python. Thanks for your support and feedback as always. Enjoy! g3tsyst3m.com/shellcode/pic/โ€ฆ
English
2
38
162
9.3K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Steve S.
Steve S.@0xTribouletยท
I put a BOF loader in a BOF so that you can run BOFs from a BOF. If you've had issues getting a BOF to work with CS's BOF loader in the past, you now have a drop-in way to get a little bit more compatibility. github.com/0xTriboulet/Inโ€ฆ
English
8
43
196
10.5K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
codewhisperer84
codewhisperer84@codewhisperer84ยท
Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Titโ€ฆ
English
14
183
552
92.3K
Dhaval Gandhi
Dhaval Gandhi@dhavalg2006ยท
Happy to complete 6 yrs with Goanywhere MFT product from Fortra on file transfer/manage solution. Let me know if you need any support or guidance โ˜บ๏ธ๐Ÿ™ linkedin.com/in/dhaval-gandโ€ฆ
English
1
0
0
47
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Dirk-jan
Dirk-jan@_dirkjanยท
I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-globโ€ฆ
English
140
903
3.2K
472.9K
๐ถ๐‘‡-๐ป๐‘’๐‘™๐‘™๐‘๐‘Ž๐‘ก nag-retweet
Crusaders of Rust
Crusaders of Rust@cor_ctfยท
Say hello to Eternal Tux๐Ÿง, a 0-click RCE exploit against the Linux kernel from KSMBD N-Days (CVE-2023-52440 & CVE-2023-4130) willsroot.io/2025/09/ksmbd-โ€ฆ Cheers to @u1f383 for finding these CVEs + the OffensiveCon talk from gteissier & @laomaiweng for inspiration!
English
11
200
758
81.4K