Spence

6.4K posts

Spence banner
Spence

Spence

@SecEventsPen

Cyber Geek, Pentester, Social Engineer & all round awesome guy! Should have been in the Avengers, but all the spots were taken! Views/opinions are my own 🙊

Certified Bic Pentester 加入时间 Mayıs 2014
1.1K 关注616 粉丝
置顶推文
Spence
Spence@SecEventsPen·
The story of me breaking into Infosec: • I don't have any degree (still don’t) • I didn't have any cyber specific certifications • I wasn't directly mentored by anybody All I had was the drive to succeed & freely available resources created by the community
English
1
1
19
0
Spence 已转推
Andy Gill
Andy Gill@ZephrFish·
Thanks for the overwhelming support on launch day, it is genuinely appreciated everyone who's taken the time (and their hard earned cash) to purchase the course. What I negated to include on the launch post was the functions of the platform as I've had a few people ask on DMs and figured only fair to share. Security & Account MFA with TOTP supported for additional account security. Pentest results can be found at lms.zsec.red/security/pente… helpfully carried out by Shinobi Security Accessibility Dark mode, colour-blind modes, reduced motion, font preferences, 15+ language translations with RTL support using i18next Community Private Discord server with dedicated support channels (Note that the discord server is on a manual approval basis to prevent spam and abuse) Ticket-based helpdesk (if you have feedback, bugs or other issues please open a ticket and I'll try to push fixes as soon as I can) Certificates When you finish the course you have the option to generate a certificate which will give you a PDF, PNG, JPG and also the ability to verify your certificate, see here for my test account: lms.zsec.red/verify/MAE-202… There is also built in 'share to LinkedIn' to help you show off your completion certificate! Badges / Achievements Everyone who purchases gets access to 'achievements' and 'badges' which unlock as you progress the course to show what stage you're at, plus you can share your public page by going to badges then click share. lms.zsec.red/profile/public… Every piece of this has been designed to make the learning experience as smooth as possible while keeping the content secure.
Andy Gill@ZephrFish

Today is the day and I'm sorry it's been so long, and also provisionally delayed by nearly a week. lms.zsec.red launches today with my Malwareless Adversarial Emulation (MAE) course. If you signed up for the waitlist, you should have received an email.

English
1
5
35
6K
Spence 已转推
Andy Gill
Andy Gill@ZephrFish·
@SecEventsPen Thank you for all of the support along the way it's been a lot of hours!
English
0
1
1
154
Spence
Spence@SecEventsPen·
Having watched this go from a casual chat to what it’s now become, seen first hand all the long hours, hard work, heart and soul he’s poured into it based on countless years of experience across, it’s great to see that what Andy has built is now avaialbale!
Andy Gill@ZephrFish

Today is the day and I'm sorry it's been so long, and also provisionally delayed by nearly a week. lms.zsec.red launches today with my Malwareless Adversarial Emulation (MAE) course. If you signed up for the waitlist, you should have received an email.

English
1
1
2
282
Spence 已转推
Andy Gill
Andy Gill@ZephrFish·
Today is the day and I'm sorry it's been so long, and also provisionally delayed by nearly a week. lms.zsec.red launches today with my Malwareless Adversarial Emulation (MAE) course. If you signed up for the waitlist, you should have received an email.
English
9
43
233
36.8K
Spence
Spence@SecEventsPen·
@I_Am_Jakoby Awesome dude - you keep going from strength to strength 🔥🔥👌🏻👌🏻
English
0
0
1
29
I am Jakoby
I am Jakoby@I_Am_Jakoby·
I'm getting close to dropping the biggest update my website has had to date! This was an INCREDIBLE amount of work, but I decided I wanted to start betting on myself and what I have to offer and this is a big step in that direction 😌 ➡️powershellforhackers.com
I am Jakoby tweet media
English
13
16
157
8.5K
Spence
Spence@SecEventsPen·
@evstykas I’m biased by Belfast is awesome 😎
English
0
0
3
33
Spence
Spence@SecEventsPen·
@I_Am_Jakoby This is awesome 🙌🏻 Thankyou for putting together and sharing!!
English
1
0
1
283
I am Jakoby
I am Jakoby@I_Am_Jakoby·
PowerShell for Hackers is LIVE. 💻 A fully interactive Windows-like hacking playground 📜 A blog to share PowerShell hacking techniques 🎯 CTFs, tools, payloads, and more... 👀 Explore it now: powershellforhackers.com I reccomend starting with the first blog post which should help you navigate the site and learn the different areas. powershellforhackers.com/blog/post?slug… There are a bunch of different easter eggs and cool places to explore. Please feel free to navigate back to this post and share some constructive criticism or things you would like to see me implement into the site I appreciate your guys' support so far and am pretty excited to be back in the swing of things
I am Jakoby tweet media
English
41
179
892
126.1K
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿@_EthicalChaos_·
I've managed to get a simple Hello World BOF PE file down to 4kb, so it's still possible to keep the PE files lean if that's your goal. Thoughts?
English
4
0
6
1.6K
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿@_EthicalChaos_·
For those that often write BOF code, who would prefer a middle ground design where you execute a fully linked PE file but still integrated with the beacon API during execution? I'm thinking of writing a PE loader that has this in mind. 1/
CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 tweet mediaCCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 tweet mediaCCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 tweet media
English
2
11
86
6.8K
myexploit2600
myexploit2600@myexploit2600·
Password that’s provided for the test: YP&53-/##11IT&$$[gvA6Re14KMe^t/1tc VS 90% password choice of their domain users: Winter24
English
3
0
19
573
Spence
Spence@SecEventsPen·
@myexploit2600 Awesome work as usual mate!! We need a catch up 👍🏻
English
1
0
2
363
Spence 已转推
myexploit2600
myexploit2600@myexploit2600·
In less than 45 minutes I download free trial copies of Windows Server 2022, Win 10 Enterprise from Microsoft. Span them up in VM workstation (now free) configured both ready for a new domain, using this walkthrough github.com/myexploit/LAB/… Vulnerable lab built.
English
1
48
154
12.2K
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
Honored to be part of the incredible @codeblue_jp conference today. Feeling big in Japan—what an experience! Thank you for having me!
Vangelis tix Stykas tweet media
English
2
3
26
1.8K
Rasta Mouse
Rasta Mouse@_RastaMouse·
Assembly for n00bs with hand-on labs. Anyone interested in seeing this? 😛
Rasta Mouse tweet media
English
46
38
543
37.2K
Spence
Spence@SecEventsPen·
@I_Am_Jakoby @dr3dn0t This is awesome stuff - great to see you doing well and thriving!!! 👏🏻👏🏻👍🏻
English
0
0
1
17
I am Jakoby
I am Jakoby@I_Am_Jakoby·
last night me and @dr3dn0t went back and forth to see how short we could get this made a subdomain enum tool in PS with just 150 characters 😏 the word "impossible" can be " IM POSSIBLE" if you look at it from the right angle (code in alt text)
I am Jakoby tweet media
I am Jakoby@I_Am_Jakoby

Jakoby you can't turn everything into a Powershell 1 liner under 259 characters... what if you want to enumerate subdomains? You have to use a tool like Amass... BET. we'll make google do it for us Code in ALT text 😉 (change website as desired)

English
20
5
76
3.6K