A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and selfβdeletion.
A no-reboot, in-memory Linux persistence PoC leveraging namespace joining, user-namespace elevation, and selfβdeletion.
07.08.2025 07:24 β π 0 π 0 π¬ 0 π 0
BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.
BamboozlEDR: A comprehensive ETW (Event Tracing for Windows) event generation tool designed for testing and research purposes.
07.08.2025 02:24 β π 0 π 0 π¬ 0 π 0
The Silent Exfiltration: Zero Click Agentic AI Hack That Can Leak Your Google Drive with One Email
The Silent Exfiltration: Zero Click Agentic AI Hack That Can Leak Your Google Drive with One Email
05.08.2025 22:39 β π 0 π 0 π¬ 0 π 0
DNS Proxy for C2 Servers
DNS Proxy for C2 Servers
05.08.2025 15:54 β π 0 π 0 π¬ 0 π 0
Before ToolShell: Exploring Storm-2603βs Previous Ransomware Operations
Before ToolShell: Exploring Storm-2603βs Previous Ransomware Operations
05.08.2025 01:24 β π 0 π 0 π¬ 0 π 0
The Hidden Gaps in Entra ID Linkable Token Identifier
The Hidden Gaps in Entra ID Linkable Token Identifier
05.08.2025 01:09 β π 0 π 0 π¬ 0 π 0
Attack Graph Model Design Requirements and Examples
Attack Graph Model Design Requirements and Examples
04.08.2025 18:09 β π 0 π 0 π¬ 0 π 0
Lateral Movement - BitLocker
Lateral Movement - BitLocker
04.08.2025 16:09 β π 0 π 0 π¬ 0 π 0
GitHound - a BloodHound OpenGraph collector for GitHub, designed to map your organizationβs structure and permissions into a navigable attackβpath graph
GitHound - a BloodHound OpenGraph collector for GitHub, designed to map your organizationβs structure and permissions into a navigable attackβpath graph
04.08.2025 12:24 β π 0 π 0 π¬ 0 π 0
Out-of-the-box CobaltStrike Beacon source code use C++
Out-of-the-box CobaltStrike Beacon source code use C++
04.08.2025 09:54 β π 0 π 0 π¬ 0 π 0
Accelerating Offensive R&D with LLMs
Accelerating Offensive R&D with LLMs
02.08.2025 09:09 β π 0 π 0 π¬ 0 π 0
BloodHound v8: Usability, Extensibility, and OpenGraph
BloodHound v8: Usability, Extensibility, and OpenGraph
01.08.2025 18:39 β π 0 π 0 π¬ 0 π 0
RingReaper: Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
RingReaper: Linux post-exploitation agent that uses io_uring to stealthily bypass EDR detection by avoiding traditional syscalls.
01.08.2025 00:09 β π 0 π 0 π¬ 0 π 0
Async BOFs - "Wake Me Up, Before You Go Go"
Async BOFs - "Wake Me Up, Before You Go Go"
31.07.2025 04:09 β π 0 π 0 π¬ 0 π 0
MSSQLHound: PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph
MSSQLHound: PowerShell collector for adding MSSQL attack paths to BloodHound with OpenGraph
30.07.2025 03:09 β π 0 π 0 π¬ 0 π 0
Hells-Hollow: Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
Hells-Hollow: Hells Hollow Windows 11 Rootkit technique to Hook the SSDT via Alt Syscalls
29.07.2025 22:39 β π 0 π 0 π¬ 0 π 0
SSDT Hooking via Alt Syscalls for ETW Evasion
SSDT Hooking via Alt Syscalls for ETW Evasion
29.07.2025 21:54 β π 0 π 0 π¬ 0 π 0
An ADCS honeypot to catch attackers in your internal network.
An ADCS honeypot to catch attackers in your internal network.
29.07.2025 00:54 β π 0 π 0 π¬ 0 π 0
DPAPI Backup Key Compromise Pt. 1: Some Forests Must Burn
DPAPI Backup Key Compromise Pt. 1: Some Forests Must Burn
28.07.2025 20:39 β π 0 π 0 π¬ 0 π 0
RAITrigger technique that abuses the RAiForceElevationPromptForCOM RPC function in appinfo.dll to trigger SYSTEM authentication to an arbitrary UNC path. This can be useful for relaying or ADCS attacks in domain environments
RAITrigger technique that abuses the RAiForceElevationPromptForCOM RPC function in appinfo.dll to trigger SYSTEM authentication to an arbitrary UNC path. This can be useful for relaying or ADCS attacks in domain environments
27.07.2025 23:39 β π 0 π 0 π¬ 0 π 0
Detecting ADCS Privilege Escalation
Detecting ADCS Privilege Escalation
27.07.2025 20:39 β π 0 π 0 π¬ 0 π 0
Monitor Cobalt Strike beacon for Windows tokens and gain Kerberos persistence
Monitor Cobalt Strike beacon for Windows tokens and gain Kerberos persistence
27.07.2025 12:24 β π 0 π 0 π¬ 0 π 0
The RPC-function RAiForceElevationPromptForCOM from the appinfo.dll library allows SYSTEM coercion. This only works on domain joined systems. This function can be called from any low privileged user to trigger SYSTEM authentication to an arbitrary location
The RPC-function RAiForceElevationPromptForCOM from the appinfo.dll library allows SYSTEM coercion. This only works on domain joined systems. This function can be called from any low privileged user to trigger SYSTEM authentication to an arbitrary location
27.07.2025 11:39 β π 0 π 0 π¬ 0 π 0
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike
A small collection of Crystal Palace PIC loaders designed for use with Cobalt Strike
26.07.2025 23:09 β π 0 π 0 π¬ 0 π 0
Escaping the Confines of Port 445
Escaping the Confines of Port 445
26.07.2025 19:54 β π 0 π 0 π¬ 0 π 0
Make Sure to Use SOAP(y) - An Operators Guide to Stealthy AD Collection Using ADWS
Make Sure to Use SOAP(y) - An Operators Guide to Stealthy AD Collection Using ADWS
25.07.2025 23:39 β π 1 π 0 π¬ 0 π 0
netescape: Malware traffic obfuscation library
netescape: Malware traffic obfuscation library
25.07.2025 07:54 β π 0 π 0 π¬ 0 π 0
An Analysis of a Malicious Solana Open-source Trading Bot
An Analysis of a Malicious Solana Open-source Trading Bot
25.07.2025 02:39 β π 0 π 0 π¬ 0 π 0
x86-64 GetPC: SYSCALL
x86-64 GetPC: SYSCALL
24.07.2025 04:54 β π 0 π 0 π¬ 0 π 0
LudusHound - a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing
LudusHound - a tool for red and blue teams that transforms BloodHound data into a fully functional, Active Directory replica environment via Ludus for controlled testing
23.07.2025 05:54 β π 0 π 0 π¬ 0 π 0
Mirrors r/redteamsec, "dedicated to red and blue teaming content." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse
Mirrors r/netsec, "a community-curated link aggregator of technical information security content." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse
Mirrors r/blueteamsec, "intelligence, research and engineering to help operational [blue|purple] teams defend their estates." Unofficial. Operated by @tweedge.net, open source @ https://github.com/tweedge/xpost-reddit-to-fediverse
CloudSec manager at that online-bookstore-slash-server-rental company, adjunct professor at RIT, former janitor for r/cybersecurity. Writes @ https://chris.partridge.tech. Proofs @ https://tweedge.proven.lol. Cat person. Cheerful ^_^