s1zz (@s1zzzz) 's Twitter Profile
s1zz

@s1zzzz

🔴 Red Teamer | 💻 OSCP / CRTO / CRTE | 🎓 CS @FLPolyU

ID: 2305836618

linkhttps://ralphdesmangles.github.io/ calendar_today23-01-2014 02:53:46

1,1K Tweet

708 Followers

3,3K Following

Grzegorz Tworek (@0gtweet) 's Twitter Profile Photo

As a fan of non-obvious persistence mechanisms I had to try to collect (and categorize!) them all. It has just started, first 10 entries appeared, and more is coming each day. I am happy to share it. Enjoy, contribute, use freely - persistence-info.github.io

@ChrisTruncer@bsky.social (@christruncer) 's Twitter Profile Photo

Want to know about how the US's red team operates? We've just released a report for you to review a previous assessment of ours! "During SILENTSHIELD assessments, the red team first performs a no-notice, long-term simulation of nation-state cyber operations"

MrAle98 (@mrale_98) 's Twitter Profile Photo

At the following link you can find all the infos related to a C++ implant i created for sliver C2: infosec.exchange/@ale98/1130757… Thanks goes of course to Bishop Fox, Moloch, rkvl and the contributors for the awesome tool!

Murad 💹🧲 (@muststopmurad) 's Twitter Profile Photo

If you're going to watch ONE video during this Memecoin Supercycle... Watch this. 2025 will be the Year where Memecoins go Parabolic. Watch this Video to Understand Why.

Chris Thompson (@_mayyhem) 's Twitter Profile Photo

Want to move laterally from C2 on an Intune admin's workstation to any Intune-enrolled device? Check out Maestro (github.com/Mayyhem/Maestro), a new(ish) tool I wrote for those situations, and this blog post to walk you through how: posts.specterops.io/maestro-9ed71d…

Steven (@0xthirteen) 's Twitter Profile Photo

I’ve always thought Seatbelt was a great situational awareness tool, I created a python implementation of it. Due to the nature of how I expect it to run, it only implements the remote modules, but I hope someone finds it useful. github.com/0xthirteen/Car…

Trail of Bits (@trailofbits) 's Twitter Profile Photo

Our new whitepaper covers secure-by-design steps that CEXes can take to keep users' accounts (and funds) safe from account takeover (ATO) in 2025. (Read more 👇)

Our new whitepaper covers secure-by-design steps that CEXes can take to keep users' accounts (and funds) safe from account takeover (ATO) in 2025.
(Read more 👇)
Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Had some friends that needed it so SCCMHunter can now use NTLM auth for LDAPS channel binding. Kerberos coming soon. github.com/garrettfoster1…

drm (@lowercase_drm) 's Twitter Profile Photo

i was bored at night, so i played with the netsync attack. Meet netdumper.py, a pure TCP RPC based script to netsync machine (and gMSA!) accounts. Nothing new, mostly based on previous works by Charlie Clark, Andrew, @evi1cg et al. gist.github.com/ThePirateWhoSm… 🌻

i was bored at night, so i played with the netsync attack. 
Meet netdumper.py, a pure TCP RPC based script to netsync machine (and gMSA!) accounts. Nothing new, mostly based on previous works by <a href="/exploitph/">Charlie Clark</a>, <a href="/4ndr3w6S/">Andrew</a>, @evi1cg et al.
gist.github.com/ThePirateWhoSm…
🌻
Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

She's started a fundraiser in his honor to help give back to the community that has supported him so much. I want to support her every way I can. Please consider sharing and/ or donating for autism research! support.researchautism.org/2025NYCMaratho…

Garrett (@unsigned_sh0rt) 's Twitter Profile Photo

Not sure if this has been posted elsewhere but I found it interesting TIL you can combine Dirk-jan's krbrelayx and the CredMarshalTargetInfo abuse James Forshaw discovered to abuse unconstrained delegation configured user and computer accounts 🧵

Rad (@rad9800) 's Twitter Profile Photo

Michael Weber gave a talk on writing malicious browser extensions at DerbyCon in 2018. Despite the age, the ideas and techniques remain useful and highly relevant to all stages of malware development. Highly recommended. Kudos to the red hat man, Weber. youtu.be/mKesEr1g4j0

<a href="/BouncyHat/">Michael Weber</a> gave a talk on writing malicious browser extensions at DerbyCon in 2018.

Despite the age, the ideas and techniques remain useful and highly relevant to all stages of malware development.

Highly recommended. Kudos to the red hat man, Weber.

youtu.be/mKesEr1g4j0