macOS DYLIB Injection at Scale: Designing a Self-Sufficient Loader
Letโs explore Dylib injection and Dylib proxying on macOS (the equivalent of Windows DLL injection)
Binary injection vulnerabilities can be found in many MacOS apps. Those may be abused to bypass EDR, hide backdoor, access memory, or bypass TCC!
DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them
#redteam
blog.balliskit.com/macos-dylib-...
17.09.2025 16:25 โ ๐ 3 ๐ 2 ๐ฌ 0 ๐ 0
Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.
๐ New blog post!
"Offline Extraction of Symantec Account Connectivity Credentials (ACCs)"
Following my previous post on the subject, here is how to extract ACCs purely offline.
๐ itm4n.github.io/offline-extr...
#redteam #pentesting
15.06.2025 16:33 โ ๐ 10 ๐ 4 ๐ฌ 3 ๐ 0
We are proud to introduce #dAWShund to the world: a framework for putting a leash on naughty AWS permissions. dAWShund helps blue and red teams find resources in #AWS, evaluate their access levels and visualize the relationships between them.
falconforce.nl/dawshund-fra...
#blueteaming #redteaming
11.04.2025 11:54 โ ๐ 11 ๐ 3 ๐ฌ 1 ๐ 0
With putty, thereโs a nice little trick you can do to enable connection sharing and piggy back off their sessionโฆ helps get around things like mfa ๐
10.04.2025 21:49 โ ๐ 4 ๐ 0 ๐ฌ 1 ๐ 0
Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch ๐
09.04.2025 18:55 โ ๐ 4 ๐ 3 ๐ฌ 0 ๐ 0
Fileless lateral movement with trapped COM objects | IBM
New research from IBM X-Force Red has led to the development of a proof-of-concept fileless lateral movement technique by abusing trapped Component Object Model (COM) objects. Get the details.
[Blog] This ended up being a great applied research project with my co-worker Dylan Tran on weaponizing a technique for fileless DCOM lateral movement based on the original work of James Forshaw. Defensive recommendations provided.
- Blog: ibm.com/think/news/f...
- PoC: github.com/xforcered/Fo...
25.03.2025 21:21 โ ๐ 15 ๐ 11 ๐ฌ 0 ๐ 1
Prodaft has published a technical analysis of Anubis, a new Python-based backdoor linked to Savage Ladybug (FIN7) operations
catalyst.prodaft.com/public/repor...
16.03.2025 10:39 โ ๐ 8 ๐ 2 ๐ฌ 0 ๐ 0
Blind Eagle: โฆAnd Justice for All - Check Point Research
Key Points Introduction APT-C-36, also known as Blind Eagle, is a threat group that engages in both espionage and cybercrime. It primarily targets organizations in Colombia and other Latin American co...
The Blind Eagle APT group has compromised over 1,600 victims inside Colombian institutions and government agencies.
The campaign took place in November & December of last year and used an exploit similar to a zero-day exploited by Russian hackers in Ukraine.
research.checkpoint.com/2025/blind-e...
11.03.2025 13:30 โ ๐ 9 ๐ 6 ๐ฌ 0 ๐ 0
GitHub - decoder-it/KrbRelayEx-RPC
Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.
KrbRelayEx-RPC tool is out! ๐
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
github.com/decoder-it/K...
14.03.2025 10:18 โ ๐ 9 ๐ 10 ๐ฌ 0 ๐ 0
C2 Beaconing Detection with MDE Aggregated Report Telemetry
Detecting C2 Beaconing using MDE Aggregated Report Telemetry.
๐จ Detect C2 Beacons!
New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!
๐
academy.bluraven.io/blog/beaconi...
#ThreatHunting #DetectionEngineering #MDE
14.03.2025 14:13 โ ๐ 8 ๐ 3 ๐ฌ 0 ๐ 0
Haha youโre clutching at straws there!
You should be honoured to get my first post ๐
13.03.2025 06:02 โ ๐ 0 ๐ 0 ๐ฌ 1 ๐ 0
So whenโs your last day at Fortra? ๐
12.03.2025 22:11 โ ๐ 1 ๐ 0 ๐ฌ 1 ๐ 0
It appears Microsoft quietly mitigated most of the risk of the "Intune company portal" device compliance CA bypass by restricting the scope of Azure AD graph tokens issued to this app, making them almost useless for most abuse scenarios. Thx @domchell.bsky.social for the heads up.
20.02.2025 11:08 โ ๐ 28 ๐ 9 ๐ฌ 0 ๐ 0
Infosec, Detection Engineering, Threat Research, Threat Hunting, OffSec, Conference Organizer.
security "research" / opinions my own
Red Team | Co-Lead for @redteamvillage_ | OSCP
Windows Internals Author, Developer, Reverse Engineer, Security Researcher, Speaker, Trainer, and most recently Nation State Hacker.
Core OS Platform Developer at Apple, Hyper-V Vendor at Microsoft, Chief Architect at CrowdStrike and now Director at CSE.
Cybersecurity news, techniques, exploits, and tools every week at http://blog.badsectorlabs.com ๐@badsectorlabs@infosec.exchange
Detection @Splunk | previously @nextronsystems | @sigma_hq & @magicswordio maintainer | Eternal Learner
Security researcher.
I have a blog: https://sapirxfed.com
Tester of Pens, Ex-Teamer of Red things, now with a more purpley shade. Biker and Recovering Eve-Online Addict. o7
https://blog.scriptmonkey.uk
Hunt & Response @ Huntress
Author of Constructing Defense
๐จ๐ฆ
Outsmart, Outmaneuver, Redefine the Tactics blog ๐ https://posts.redteamtacticsacademy.com/
learn ๐ https://masterclass.redteamtacticsacademy.com
[ 'cto @sensepost.com', '@orangecyberdef', 'caffeine fueled', '(โฏยฐโกยฐ)โฏ๏ธต โปโโป', 'security guy', 'metalhead', 'i saw your password', 'KOOBo+KXleKAv+KXlSnjgaM=' ]
MITRE ATT&CKยฎ - A knowledge base for describing the behavior of adversaries. Replying/Following/Reposting โ endorsement.
Kerberoast Guy โข RedSiege CEO โข Hater of Pants โข Former SANS 560 Author, Senior Instructor โข Packers owner โข Work Req: http://redsiege.com/contact
Sometimes I help stop bad people from doing bad things on the internet.
since 1985
https://phrack.org
Red Team enthusiast | Malware development enjoyer | Adversary Simulation at @quarkslab.bsky.social
Just another infoSec geek, Creating Content @CyberDose, Organizing @BSidesABQ, Board Member @OWASPCairo, I speak for myself ๐ต๐ธ
My blog: m19o.github.io
Geek, entrepreneur and criminologist working on threat intelligence led red teaming via Cyberdefense B.V. #TIBER #TLPT #RT