Chris Spehn (@conscioushacker) 's Twitter Profile
Chris Spehn

@conscioushacker

Adversary Simulation @ IBM's X-Force Red.

ID: 100861577

calendar_today31-12-2009 23:16:46

8,8K Tweet

3,3K Followers

1,1K Following

dreadnode (@dreadnode) 's Twitter Profile Photo

We're heading to Vegas August 5-10! Send us a DM if you'd like to meet up onsite. Happy to share our latest offensive agents, AI red team tooling, custom evals, and training capabilities on the Strikes platform. Plus, "shiny rocks"??

We're heading to Vegas August 5-10! Send us a DM if you'd like to meet up onsite.

Happy to share our latest offensive agents, AI red team tooling, custom evals, and training capabilities on the Strikes platform. Plus, "shiny rocks"??
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

For those like me who prefer to stay in the terminal and want to call REST APIs like the Microsoft Graph without complicated commands or copy/pasting tokens: roadtx now has a graphrequest command to perform simple requests against these APIs and parse the JSON.

For those like me who prefer to stay in the terminal and want to call REST APIs like the Microsoft Graph without complicated commands or copy/pasting tokens: roadtx now has a graphrequest command to perform simple requests against these APIs and parse the JSON.
Logan Goins (@_logangoins) 's Twitter Profile Photo

My first SpecterOps blog! Ever wanted to collect Active Directory information from LDAP for a Red Team? Using LDAP's more OPSEC-considerate cousin: ADWS can be used to improve upon the already present advantages of using smaller-scaling LDAP queries. specterops.io/blog/2025/07/2…

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Thanks to the team dreadnode for joining me for an informative stream today! You can watch the recording on YouTube here: youtube.com/watch?v=BzOmGw… Off By One Security

Chris Spehn (@conscioushacker) 's Twitter Profile Photo

I have three specific Vegas goals and they're all related to hats. We're going for the hat trick with dreadnode, SpecterOps, and FalconForce Official. Why? I'm a fan of these companies and their logos and I need new hats that I actually like.

SpecterOps (@specterops) 's Twitter Profile Photo

BloodHound v8.0 is here! 🎉 This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by exposing attack paths throughout your entire tech stack, not just AD/Entra ID. Read more from Justin Kohler: ghst.ly/bloodhoundv8 🧵: 1/7

Natalie Silvanovich (@natashenka) 's Twitter Profile Photo

While most vendors ship timely patches for vulnerabilities reported by Project Zero, they don’t always reach users. Today, we’re announcing Reporting Transparency, a new policy to encourage downstream fixes googleprojectzero.blogspot.com/2025/07/report…

chompie (@chompie1337) 's Twitter Profile Photo

I’m honored to be joining some amazing women in cybersecurity at the #BHUSA panel “Hacking the Status Quo”. We’ll be sharing the journey of our careers: how we got started and what’s shaped us. Bring your questions and leave with fresh perspective 😊 blackhat.com/us-25/briefing…

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - github.com/SpecterOps/MSS… - specterops.io/blog/2025/07/2…

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it!
- github.com/SpecterOps/MSS…
- specterops.io/blog/2025/07/2…
Andy Zou (@andyzou_jiaming) 's Twitter Profile Photo

We deployed 44 AI agents and offered the internet $170K to attack them. 1.8M attempts, 62K breaches, including data leakage and financial loss. 🚨 Concerningly, the same exploits transfer to live production agents… (example: exfiltrating emails through calendar event) 🧵

We deployed 44 AI agents and offered the internet $170K to attack them.

1.8M attempts, 62K breaches, including data leakage and financial loss.

🚨 Concerningly, the same exploits transfer to live production agents… (example: exfiltrating emails through calendar event) 🧵
b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

I'm releasing a backend for multi-agent AI systems that need to model complex non-linear problems. Kafka handles async agent communication, with ingestion plugins that route data to Neo4j, Qdrant, and MinIO. Check it out on the IBM X-Force GitHub! github.com/xforcered/Agen…

Nathan McNulty (@nathanmcnulty) 's Twitter Profile Photo

ICYMI, LOLRMM (lolrmm.io) now has SIEM (or XDR) detections as well This is an absolute must have detection query, exclude your actual RMM(s) and alert on any that aren't supposed to be used

ICYMI, LOLRMM (lolrmm.io) now has SIEM (or XDR) detections as well

This is an absolute must have detection query, exclude your actual RMM(s) and alert on any that aren't supposed to be used
Dave Cossa (@g0ldengunsec) 's Twitter Profile Photo

New BH OpenGraph stuff is pretty cool, threw together a super basic PoC to map attack paths through SCCM this afternoon using data pulled from the site DB:

New BH OpenGraph stuff is pretty cool, threw together a super basic PoC to map attack paths through SCCM this afternoon using data pulled from the site DB:
Outflank (@outflanknl) 's Twitter Profile Photo

New blog! Here's our case study on using LLMs for accelerating offensive R&D. Our post details how we used Large Language Models to identify and exploit trapped COM objects. Next week at BlackHat we'll drop even hotter stuff on offensive AI research. 🔥 outflank.nl/blog/2025/07/2…

Kyle Avery (@kyleavery_) 's Twitter Profile Photo

there are some cool opportunities for automation with public models (gpt-4.1 in this case) more on training custom models next thursday