mthcht

mthcht

@mthcht.bsky.social

Threat Hunting - DFIR - Detection Engineering πŸ™ https://github.com/mthcht 🐦 https://x.com/mthcht πŸ“° https://mthcht.medium.com

893 Followers 310 Following 57 Posts Joined Aug 2024
10 hours ago
LOLEXFIL β€” LOL Exfiltration Reference

LOLEXFIL
Living off the land Data Exfiltration method

lolexfil.github.io

1 1 0 0
1 week ago
Preview
awesome-lists/Lists at main Β· mthcht/awesome-lists Awesome Security lists for SOC/CERT/CTI. Contribute to mthcht/awesome-lists development by creating an account on GitHub.

Hello @yousefnein.bsky.social glad to hear the repos are being useful. If you’d like to contribute or enhance any of the lists in github.com/mthcht/aweso..., contributions are very welcome. I don’t have much time to keep them updated quickly

0 0 0 0
1 week ago
Preview
GitHub - mthcht/Splunk-MCP-Client: Query Splunk in natural language using Claude AI and the Splunk MCP Server. Query Splunk in natural language using Claude AI and the Splunk MCP Server. - mthcht/Splunk-MCP-Client

If you want to experiment with the Splunk MCP Server splunkbase.splunk.com/app/7931, I just published a client to interact with it:
github.com/mthcht/Splun...

it cost around 5 cents per splunk query, an automated case investigation cost an average of 50 cents depending on the complexity.

0 0 0 0
9 months ago
Preview
Lumma Stealer sinkholed domains Lumma Stealer sinkholed domains. GitHub Gist: instantly share code, notes, and snippets.

Lumma Stealer - 995 sinkholed domains by Microsoft
gist.github.com/mthcht/4b16e...

2 0 0 0
11 months ago
Post image

it used to be great...

5 0 1 0
11 months ago

@hexacorn.bsky.social :o someone just sent me your list hexacorn.com/examples/201... this is great thanks!

3 0 1 0
11 months ago

I started another list dedicated to mutex names for detection
github.com/mthcht/aweso...

Help me enhance this list, I still have plenty more to add!

2 0 1 0
1 year ago

Thanks! Glad you like them!

2 0 0 0
1 year ago

THIS WEBSITE HAS BEEN SEIZED

Discover domains tied to sinkhole NS servers at sinkholed.github.io

Filter by TLD or NS, export in JSON/CSV, weekly update!

Search for the known sinkhole Name Servers in DNS query logs and web access to the sinkholed domains to identify potentially compromised hosts!

11 5 1 0
1 year ago

😯 I have 652022 sinkholed domains extracted here github.com/mthcht/aweso...

1 1 0 0
1 year ago
Post image

🎭 #ThreatHunting February updates 🎭
πŸ™ release: github.com/mthcht/Threa...
🌐 Site: mthcht.github.io/ThreatHuntin...
🧬 yara: github.com/mthcht/Threa...
🐾 Specific artifact lists: github.com/mthcht/aweso...

5 2 0 0
1 year ago

Of course! PRs are welcome πŸ™

0 0 1 0
1 year ago
Powershell: after 5 "type .\5\test.txt" calls, the test.txt file is a symlink to win.ini
CMD: A single "type .\6\test.txt" call results in every single file being printed, including the final win.ini symlink

From over at the Bad Place:
There's an interesting NTFS symlink attack outlined here:
https://dfir.ru/2025/02/23/symlink-attacks-without-code-execution/

Basically, if an NTFS filesystem is corrupted in a way to provide duplicate file names, Windows will […]

[Original post on infosec.exchange]

16 13 1 0
1 year ago
Preview
Confluence Exploit Leads to LockBit Ransomware Key Takeaways The intrusion began with the exploitation of CVE-2023-22527 on an exposed Windows Confluence server, ultimately leading to the deployment of LockBit ransomware across the environment.…

It took just 3 hours:

RCE β†’ Metasploit C2 β†’ Anydesk for remote GUI-access β†’ LockBit ransomware

Interestingly, we observed the threat actor using PDQ Deploy, a patch management tool.

Read the report here:

9 3 1 0
1 year ago

A bookmark of my lists is now automatically generated after each update in my repo github.com/mthcht/aweso...
I'm also looking to automatically add my starred repos lists github.com/mthcht?tab=s... in this bookmark but there doesn’t seem to be a API endpoint for the stars lists πŸ€” ?

7 0 0 0
1 year ago

It's growing! Now at 38 services and 82 projects πŸ™ˆ What's your favorite LoLC2?

2 0 1 0
1 year ago
Post image Post image

Pushed a #KQL for: Successful device code sign-in from an unmanaged device.

Query is available for AADSignInEventsBeta and SigninLogs. Less known is the AADSignInEventsBeta filter for device code:
| where EndpointCall == "Cmsi:Cmsi"

🏹Query: github.com/Bert-JanP/Hu...

5 3 2 0
1 year ago

In case you don't want to do this yourself, I just discovered that you can request access to a complete list of all existing domains across 1131 TLDs on czds.icann.org for free, including NS records! The lists are updated every month, approval is required for each TLD 🌍

3 1 0 1
1 year ago
Preview
Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time | Splunk Explore SDDL in Windows security with our comprehensive guide to help enhance your defensive strategy against privilege escalation attacks.

Hey SDDL SDDL: Breaking Down Windows Security One ACE at a Time www.splunk.com/en_us/blog/s....

Thrilled to share my first blog at @splunk! @mhaggis.bsky.social and I take a deep dive into the weird & exciting world of SDDL and ACEs - what they are, how they work, and how attackers can abuse them.

12 5 0 0
1 year ago
Post image Post image

Path masquerading zerosalarium.com/2025/01/path...

Interesting technique, if you're hunting for this, you can directly search the unicode characters in Splunk πŸ₯·

2 0 0 0
1 year ago
Post image Post image

Most SOCs handle hundreds to thousands of detection rules in their SIEM. Proper categorization is essential when creating a new detection, as it helps define criticality, urgency, implementation effort, and verbosity level. Keeping things structured will reducing alert fatigue!

5 1 0 0
1 year ago

I'll keep this updated, let me know if you have any projects to add! some C2 candidates: github.com/lolc2/lolc2....

3 1 0 0
1 year ago
Post image Post image

Cert Central .org is live!
We track and report abused code-signing certs.

By submitting to the website, you contribute to the DB of >800 certsβ€”a DB you can access and view.

Want to get more involved? Check out the Training and Research pages to learn more. 1/2

14 7 1 0
1 year ago
Post image Post image

Hexadecimal IP Detection:

Identifiy hexadecimal IP addresses format in command lines with a "simple" regex (some default behaviors to exclude)

1 0 0 0
1 year ago
Post image Post image Post image

Special Caracters anomaly Detection:

This query Extracts common special caracters from the process command line, counts occurrences, calculates ratio, and return commands with more than 20% specials caracters in it, could catch the quote insertions and url transformers techniques

2 0 1 0
1 year ago
Post image Post image

#ThreatHunting ideas for detecting command-line obfuscation techniques from github.com/wietze/Invok... with Splunk!
(examples with EID 4688)

Mixed Case Randomization Detection:

This query counts uppercase/lowercase letters and return command lines with a near-equal ratio

5 1 1 1
1 year ago
Preview
GitHub - blechschmidt/massdns: A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) A high-performance DNS stub resolver for bulk lookups and reconnaissance (subdomain enumeration) - blechschmidt/massdns

github.com/blechschmidt...

1 0 0 0
1 year ago
Video thumbnail

I have a list of NS used for sinkhole domains and seized servers: raw.githubusercontent.com/mthcht/awesome…
I'm searching for the domains, on my server I can resolve a record type for ~400 million domains per day with github.com/blechschmidt/mοΏ½οΏ½οΏ½ πŸ˜ƒ Massive improvement compared to other solutions!

1 1 1 1
1 year ago
Preview
HISAC - High Impact Security Analysis and Communication How to be a well rounded SOC/MDR/Cyber/Information Security Analyst.

I frequently get asked is "what skills do I need need to excel as an analyst", so I figure this is a good opportunity to shed some light on what analysis is, and why certifications alone won't make you a good analyst.

www.jaiminton.com/high-impact-...

8 4 0 1
1 year ago

I have a bunch of regex applied to every projects, I’ve put most of them here github.com/mthcht/aweso..., The results used for triage look like this github.com/mthcht/Strin...

1 0 0 0