Ellis Springe (@knavesec) 's Twitter Profile
Ellis Springe

@knavesec

Adversary Simulation X-Force Red, developer of tools, connoisseur of dogs

ID: 1156641971148132357

calendar_today31-07-2019 19:05:10

229 Tweet

1,1K Followers

399 Following

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Had some friends that needed it so SCCMHunter can now use NTLM auth for LDAPS channel binding. Kerberos coming soon. github.com/garrettfoster1…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Video demo of bypassing Windows Defender App Control with Loki C2! Blog with details coming in 1-2 weeks. Yes -- Dylan Tran and I created an entire C2 in JavaScript and it bypasses all the things 🥷🧙‍♂️🪄

Bobby Cooke (@0xboku) 's Twitter Profile Photo

Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to Dylan Tran and chompie for all their contributions to Loki C2! IBM IBM Security X-Force securityintelligence.com/x-force/bypass…

Chris Thompson (@retbandit) 's Twitter Profile Photo

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com. Co-organized by RemoteThreat, Dreadnode, & DEVSEC. The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com.
Co-organized by RemoteThreat, Dreadnode, & DEVSEC.
The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,
Octavian (@0xtavian) 's Twitter Profile Photo

When I first started bug hunting one month ago, I didn’t expect to generate nearly $13K in bounties. But with the help of AX Framework, I did! 🚀 Here’s my journey & why you should give it a shot: medium.com/@EthicalOffsec… #BugBounty

Chris Thompson (@retbandit) 's Twitter Profile Photo

The CFP for Offensive AI Con is now open! We’d love to hear about how you’re using knowledge assistants, semi/fully autonomous workflows, agents, or specialized models to find and weaponize vulnerabilities, speed up offensive cyber operations, develop capabilities faster, solve

Dylan Tran (@d_tranman) 's Twitter Profile Photo

Had a lot of fun digging into COM stuff with bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…

Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

John Hammond (@_johnhammond) 's Twitter Profile Photo

I Backdoored Cursor AI 😎 youtu.be/FYok3diZY78 Finally getting a chance to play with Loki C2, the super cool Node JS C2 framework for backdooring Electron applications (think Discord, Slack, too!) -- put together by the incredible Bobby Cooke 🔥We even got to nerd out over DMs to

I Backdoored Cursor AI 😎 youtu.be/FYok3diZY78 Finally getting a chance to play with Loki C2, the super cool Node JS C2 framework for backdooring Electron applications (think Discord, Slack, too!) -- put together by the incredible <a href="/0xBoku/">Bobby Cooke</a> 🔥We even got to nerd out over DMs to
Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Had some fun with PDQ deploy/inventory credential decryption and wrote about it here: unsigned-sh0rt.net/posts/pdq_cred… thanks to dru1d for write a BOF out of the POC tl;dr get admin on PDQ box, decrypt privileged creds

Brett Hawkins (@h4wkst3r) 's Twitter Profile Photo

I am thrilled to be presenting new research on attacking ML training infrastructure at TROOPERS Conference this summer. Stay tuned for a blog post and lots of updates to MLOKit closer to the conference!

I am thrilled to be presenting new research on attacking ML training infrastructure at <a href="/WEareTROOPERS/">TROOPERS Conference</a>  this summer. Stay tuned for a blog post and lots of updates to MLOKit closer to the conference!
Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me about a bug in Power Apps that allows execution of arbitrary SQL queries on hosts connected through on-prem data gateways. This can turn external O365 access into compromised on-prem SQL servers. ibm.com/think/x-force/…

Offensive AI Con (@offensiveaicon) 's Twitter Profile Photo

The deadline is approaching fast for the first wave of OAIC tickets: May 16. Purchase your ticket by THIS Friday to secure your spot! Check your inbox for details. Next round of invitations coming soon. Request an invite: offensiveaicon.com/#request-invite

The deadline is approaching fast for the first wave of OAIC tickets: May 16. Purchase your ticket by THIS Friday to secure your spot! Check your inbox for details.

Next round of invitations coming soon. Request an invite: offensiveaicon.com/#request-invite
chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…

Brett Hawkins (@h4wkst3r) 's Twitter Profile Photo

New research just dropped I'll be presenting at TROOPERS Conference next week - Attacking ML Training Infrastructure 💥 Model poisoning for code execution ⚠️ Abusing ML workflows ⚙️ MLOKit updates and new threat hunting rules ibm.com/think/x-force/…

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Last week we added ELEVATE-4 github.com/subat0mik/Misc… to Misconfiguration Manager. tl;dr If SCCM uses AD CS for PKI, client auth certs are "borrowed" by clients during OSD. This will typically be a distribution point but could be the site server in all-in-one deployments...

Dave Cossa (@g0ldengunsec) 's Twitter Profile Photo

Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence. ibm.com/think/x-force/…