Caroline Leman (@car0line_le) 's Twitter Profile
Caroline Leman

@car0line_le

ID: 3390649870

calendar_today24-07-2015 07:13:36

53 Tweet

96 Followers

102 Following

Hexacon (@hexacon_fr) 's Twitter Profile Photo

Registration for trainings is now open! ⏳ Don't miss your chance to learn from the best and have a great time in Paris 🥐 hexacon.fr/register/

Registration for trainings is now open! ⏳

Don't miss your chance to learn from the best and have a great time in Paris 🥐

hexacon.fr/register/
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas will be at #OffensiveCon by the end of the week. Don't miss our 3 talks: 🧭Escaping the Safari Sandbox by Quentin M 🚘0-Click RCE on the Tesla Infotainment by vdehors and David B 🗝️Open Sesame by Lucas Georges See you there 👋

Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninjas dzeta and aevy are ready to welcome our students for this week's training on cloud pentesting! 🇫🇷 From anonymous access to the compromise of GCP, AWS, Azure and Kubernetes environments, with hands-on practice on 4 different labs!

Our ninjas <a href="/dzetalol/">dzeta</a> and <a href="/aevy__/">aevy</a> are ready to welcome our students for this week's training on cloud pentesting! 🇫🇷 From anonymous access to the compromise of GCP, AWS, Azure and Kubernetes environments, with hands-on practice on 4 different labs!
Hexacon (@hexacon_fr) 's Twitter Profile Photo

🎟️ The ticketing for #HEXACON2024 opens TODAY at 4PM (UTC+2) Don't miss your chance to secure your spot! hexacon.fr/register/

Synacktiv (@synacktiv) 's Twitter Profile Photo

Good news! We scheduled some french training sessions in the end of 2024. Come and get trained by our best ninjas about the following topics: Active Directory and Cloud Environments pentest. 🇫🇷More details here: synacktiv.com/en/offers/trai… Register at [email protected]

Synacktiv (@synacktiv) 's Twitter Profile Photo

Want to know how we prevented some CI/CD supply chain attacks against Microsoft, FreeRDP, AutoGPT, Ant-Design, Cypress, Excalidraw and others? Read the second article in our series on exploiting GitHub Actions by Hugow. synacktiv.com/publications/g…

Synacktiv (@synacktiv) 's Twitter Profile Photo

In our latest blogpost, Quentin Roland explores the inner workings of SCCM policies and introduces SCCMSecrets.py, a tool targeting secret policies in order to exploit misconfigurations, harvest credentials, and pivot across collections by impersonating legitimate clients.

Synacktiv (@synacktiv) 's Twitter Profile Photo

Looking for offensive trainings for the end of the year? We've got french sessions for you! Come and get trained by our best ninjas on pentesting Active Directory (2 levels available), cloud environments and attacking some hardware! 🇫🇷 More details here: synacktiv.com/en/offers/trai…

Synacktiv (@synacktiv) 's Twitter Profile Photo

New script to dump the KCM database of recent versions of SSSD and convert Kerberos tickets to the standard CCACHE format to ease pass-the-cache: github.com/synacktiv/kcmd…

Synacktiv (@synacktiv) 's Twitter Profile Photo

This year, we plan to give away 2 students tickets for #HEXACON2024! Reply to this post and we will draw the 2 winners in a week 🍀

This year, we plan to give away 2 students tickets for #HEXACON2024! Reply to this post and we will draw the 2 winners in a week 🍀
Synacktiv (@synacktiv) 's Twitter Profile Photo

Worried about attackers sneakily spying on your optical fibers ? Learn with @r3n1k how they operate, and how you can defeat them - for cheaper than a flagship smartphone ! synacktiv.com/publications/d…

Blackhoodie (@blackhoodie_re) 's Twitter Profile Photo

Thanks a lot to Hexacon for hosting us! Big thanks to our wonderful trainers Jessica & Juliette for their intro to RE w Ghidra Jiska for her intro to iOS+Android debugging @cryptocorn for her training on firmware extraction & analysis. Sweet dreams of Ghidra and Frida 😌

Synacktiv (@synacktiv) 's Twitter Profile Photo

GitLab recently released a patch for the Ruby-SAML / GitLab Authentication Bypass (CVE-2024-45409). Our ninjas Alexis Danizan and Pierre Milioni analyzed the patch and wrote the exploit code! github.com/synacktiv/CVE-…