~ 已转推
~
264 posts


~ 已转推

@KottonJesse it’s gonna be heavily dependent on how they look. The issue now is that people have very high expectations that might not get fulfilled
English

@YuGiOh_TCG remember, ask to see a warrant if she wants to look at your hand
English

K9-17 Izuna is sniffing out the competition at YCS Anaheim!
Swing by the Anaheim Convention Center, Hall C, to see more incredible cosplay or test out the new Genesys format, or tune into the live stream at twitch.tv/officialyugioh…

English

@shiftingbyte @YGOPRODeck I played it because it's good against the new decks, especially when they are trying to play on T0, you can stop arthalion, winda, hollie sue, izuna/lupis with it, it's like more copies of droplet. It's also not bad when breaking boards
English
~ 已转推

My personal #defcon33 highlights:
Better tools for GPO exploitation: media.defcon.org/DEF%20CON%2033…
Critical vulns in Zscaler and Netskope: media.defcon.org/DEF%20CON%2033…
Phishing on official Microsoft login: media.defcon.org/DEF%20CON%2033…
SSH vulnerabilities: media.defcon.org/DEF%20CON%2033…
English
~ 已转推
~ 已转推

The wait is over! Our stealthy Windows persistence technique (PhantomPersist) is now out!
Read the blog post here: blog.phantomsec.tools/phantom-persis…
English
~ 已转推

🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live:
🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos:
blog.redteam-pentesting.de/2025/reflectiv…
English
~ 已转推

''Attacking an EDR - Part 1''
#infosec #pentest #redteam #blueteam
her0ness.github.io/2023-08-03-c2-…
English
~ 已转推














