Julien Legras (@julien_legras) 's Twitter Profile
Julien Legras

@julien_legras

Pentest team leader @synacktiv

ID: 106076652

calendar_today18-01-2010 12:28:41

640 Tweet

516 Followers

591 Following

Synacktiv (@synacktiv) 's Twitter Profile Photo

For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to GMOサイバーセキュリティ byイエラエ株式会社【公式】 and Downscope and thanks to Hack The Box for the fun challenges! 🥳

For the second year in a row, we managed to get first place at the #HackTheBox Business #CTF 2025! 🥇 Congratulations to <a href="/gmo_ierae/">GMOサイバーセキュリティ byイエラエ株式会社【公式】</a> and Downscope and thanks to <a href="/hackthebox_eu/">Hack The Box</a> for the fun challenges! 🥳
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

To those who set the bar 🥂 Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition: 🥇 Synacktiv 🥈 GMOセキュリティ24 |Webサイトリスク・パスワード漏洩診断 | セキュリティAI相談 🥉 downscope.org #HackTheBox

To those who set the bar 🥂
Global Cyber Skills Benchmark 2025 is over, and the leaderboard has spoken. Huge congrats to the top corporate #cybersecurity teams who crushed it in this global competition:
🥇 <a href="/Synacktiv/">Synacktiv</a> 
🥈 <a href="/GMOsecurity24/">GMOセキュリティ24 |Webサイトリスク・パスワード漏洩診断 | セキュリティAI相談</a> 
🥉 downscope.org

#HackTheBox
Synacktiv (@synacktiv) 's Twitter Profile Photo

For our second talk of the day, Florian presents Mofos, a virtual machines manipulation framework to mimic QubesOS on a standard Linux distribution #SSTIC2025

For our second talk of the day, <a href="/flgy/">Florian</a> presents Mofos, a virtual machines manipulation framework to mimic QubesOS on a standard Linux distribution #SSTIC2025
Synacktiv (@synacktiv) 's Twitter Profile Photo

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by Guillaume André and Wil. synacktiv.com/publications/n…

Synacktiv (@synacktiv) 's Twitter Profile Photo

☁️ Already wrapping up our 3-day offensive Azure training at #x33fcon! Huge thanks to the x33fcon team for hosting us, and to all our amazing students for their energy, curiosity, and sharp questions throughout the session. Now it’s time to switch gears — conference mode on! 🎤

☁️ Already wrapping up our 3-day offensive Azure training at #x33fcon!
Huge thanks to the x33fcon team for hosting us, and to all our amazing students for their energy, curiosity, and sharp questions throughout the session.
Now it’s time to switch gears — conference mode on! 🎤
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our ninja kalimero is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥

Our ninja <a href="/kalimer0x00/">kalimero</a> is now on stage at #x33fcon to talk about his journey from dissecting SCCM until the discovery of the critical CVE-2024-43468 and the post-exploitation opportunities🔥
Synacktiv (@synacktiv) 's Twitter Profile Photo

While performing penetration tests on SAP Financial Consolidation, our ninjas laxa and Alexis Danizan discovered an authentication bypass for local accounts including the built-in ADMIN account, leading to the underlying system compromise: synacktiv.com/en/advisories/…

Synacktiv (@synacktiv) 's Twitter Profile Photo

🚨 Still a few days to register for our Azure Intrusion for Red Teamers training at #BHUSA! Very hands-on, full kill chain from zero to Global Admin with stealth in mind. Secure your seat now! blackhat.com/us-25/training…

🚨 Still a few days to register for our Azure Intrusion for Red Teamers training at #BHUSA! Very hands-on, full kill chain from zero to Global Admin with stealth in mind. Secure your seat now! blackhat.com/us-25/training…
Synacktiv (@synacktiv) 's Twitter Profile Photo

Our experts took the stage at Pass the SALT Conference yesterday and this morning to present their latest offensive security research and tools! Keycloak, named pipes MITM and more! Slides and recordings coming soon 👀

Our experts took the stage at <a href="/passthesaltcon/">Pass the SALT Conference</a> yesterday and this morning to present their latest offensive security research and tools! Keycloak, named pipes MITM and more! Slides and recordings coming soon 👀
Wil (@wil_fri3d) 's Twitter Profile Photo

gpoParser, which I presented at #leHACK2025 and #DEFCON, is available here: github.com/synacktiv/gpoP… It is a specialized utility designed to enumerate Group Policy Objects (GPOs) and identify potential security misconfigurations.