Josh (@passthehashbrwn) 's Twitter Profile
Josh

@passthehashbrwn

Adversarial Simulation at IBM, tweets are mine etc.

ID: 1265682418352246787

linkhttps://passthehashbrowns.github.io calendar_today27-05-2020 16:33:06

1,1K Tweet

9,9K Followers

336 Following

Chris Thompson (@retbandit) 's Twitter Profile Photo

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com. Co-organized by RemoteThreat, Dreadnode, & DEVSEC. The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com.

Co-organized by RemoteThreat, Dreadnode, & DEVSEC.

The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,
Chris Thompson (@retbandit) 's Twitter Profile Photo

The CFP for Offensive AI Con is now open! We’d love to hear about how you’re using knowledge assistants, semi/fully autonomous workflows, agents, or specialized models to find and weaponize vulnerabilities, speed up offensive cyber operations, develop capabilities faster, solve

Dylan Tran (@d_tranman) 's Twitter Profile Photo

Had a lot of fun digging into COM stuff with bohops recently! We ended up finding a way to laterally move without dropping a file. ibm.com/think/news/fil…

Josh (@passthehashbrwn) 's Twitter Profile Photo

New blog from me should be up in 2 weeks or so. Will cover a rather silly way to go from a standard O365 account to on-prem code execution due to some not uncommon sharing misconfigurations in the affected product.

Josh (@passthehashbrwn) 's Twitter Profile Photo

Please buy my red teaming course so you can learn 7 useless derivatives of indirect syscalls from someone who has never red teamed

Bobby Cooke (@0xboku) 's Twitter Profile Photo

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to Dylan Tran for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki

Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…

Brett Hawkins (@h4wkst3r) 's Twitter Profile Photo

I am thrilled to be presenting new research on attacking ML training infrastructure at TROOPERS Conference this summer. Stay tuned for a blog post and lots of updates to MLOKit closer to the conference!

I am thrilled to be presenting new research on attacking ML training infrastructure at <a href="/WEareTROOPERS/">TROOPERS Conference</a>  this summer. Stay tuned for a blog post and lots of updates to MLOKit closer to the conference!
Josh (@passthehashbrwn) 's Twitter Profile Photo

Oh cool a hit infosec tweet, is it: A) an existing technique rewritten in a useless language B) a "new" EDR killer C) a "new" byte patch D) engagement farming account reposting old blogs

chompie (@chompie1337) 's Twitter Profile Photo

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…

Josh (@passthehashbrwn) 's Twitter Profile Photo

Security is when you tell your users to kick rocks if they want to run a program other than Edge. Also our productivity is way down does anyone have any tips?