Tony (@tj_null) 's Twitter Profile
Tony

@tj_null

Blue Teamer in Disguise. Blog at netsecfocus.com. SANS Netwars Champion. Former community manager and founder of the Offsec community for @offsectraining

ID: 1281443510

linkhttp://netsecfocus.com calendar_today19-03-2013 20:28:54

7,7K Tweet

23,23K Followers

491 Following

Kali Linux (@kalilinux) 's Twitter Profile Photo

For more than 20 years, Open Source Lab @[email protected] has been providing critical infrastructure for major FOSS projects, including Kali: kali.org/blog/ampere/. Now they are facing a difficult time and need help to keep going: osuosl.org/blog/osl-futur…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Drag a file, leak a hash—Chrome’s quiet secret exposed. In this blog, Drew @hoodoer reveals how Chrome’s drag-and-drop API lets web apps initiate complex actions; with some social engineering, it can also trigger NTLM hash leaks on Windows via SMB. Read now! trustedsec.com/blog/dragging-…

Jean (@jean_maes_1994) 's Twitter Profile Photo

🚨 Open to work — AI Security/ red team / adversary sim 8+ yrs in offensive sec, ex-Cobalt Strike, SANS instructor (12 w/y) Looking for flexible, senior/principal roles w/ impact > hours DMs open or connect via: linkedin.com/in/jean-franco…

t3l3machus (@t3l3machus) 's Twitter Profile Photo

undust is a simple utility that helps uncover archived, backup, and temporary files left behind on web servers. Given a URL, it generates the most common archive, temp and backup file name variants -> github.com/t3l3machus/und…

undust is a simple utility that helps uncover  archived, backup, and temporary files left behind on web servers. Given a  URL, it generates the most common archive, temp and backup file name  variants -> github.com/t3l3machus/und…
freefirex (@freefirex2) 's Twitter Profile Photo

I'm trying to push further with Impacket then I have before and am running into a wall. If you appreciate my opensource work and want to help me out I could use some community help figuring how what I've missed in my MS-EVEN6 method / struct definition github.com/fortra/impacke…

Tony (@tj_null) 's Twitter Profile Photo

How many times do we have to teach you Cisco. Please stop hardcoding credentials into your products/services! Thanks for coming to my ted talk.

5pider (@c5pider) 's Twitter Profile Photo

Introducing Havoc Professional: A Lethal Presence We’re excited to share a first look at Havoc Professional, a next-generation, highly modular Command and Control framework, and Kaine-kit our fully Position Independent Code agent engineered for stealth! infinitycurve.org/blog/introduct…

Microsoft Threat Intelligence (@msftsecintel) 's Twitter Profile Photo

Black Hat NOC lead Grifter and Hacker Jeopardy host 𝚕𝚒𝚗𝚝𝚒𝚕𝚎 join 💻 Sherrod DeGrippo 🛸 and share behind-the-scenes insights on managing one of the world’s most hostile networks, advice for first-time attendees, and tips on exploring the hacker community. msft.it/6019SAWw5

ghostlulz (@ghostlulz1337) 's Twitter Profile Photo

No need to bypass AV/EDR when you can just use Chrome Remote Desktop as your backdoor. Check out the blog post from TrustedSec trustedsec.com/blog/abusing-c…

Bug Bounty Village (@bugbountydefcon) 's Twitter Profile Photo

We’re excited to announce that Michael Skelton (Michael Skelton) will be speaking at the Bug Bounty Village at DEF CON 33! Stay tuned for more details on their talk, you won’t want to miss it. #BugBounty #DEFCON #BBV #BugBountyVillage

Shellter (@shellterproject) 's Twitter Profile Photo

🔥🔥🔥 Raphael Mudge's take on Elastic's way of handling all this is pure gold. Thank you. aff-wg.org/2025/07/13/tak…