Andréw Hüang's Avatar

Andréw Hüang

@cowbe.bsky.social

@cowbe0x004 Security professional with interests in pentest, red team, blue team, all the teams. #infosec #dfir

85 Followers  |  766 Following  |  2 Posts  |  Joined: 29.07.2023  |  1.5369

Latest posts by cowbe.bsky.social on Bluesky

21.11.2024 19:29 — 👍 0    🔁 0    💬 0    📌 0
Preview
Targeting the cybercrime supply chain Microsoft’s Digital Crimes Unit (DCU) has seized 256 fraudulent websites linked to ‘MRxC0DER’, who sold phishing kits under the brand names ‘ONNX’ and ‘Caffeine’. This takedown disrupts a significant ...

Microsoft's legal team seizes 256 domains used by the ONNX phishing service

blogs.microsoft.com/on-the-issue...

21.11.2024 17:24 — 👍 9    🔁 3    💬 0    📌 0
Preview
Obfuscating API Patches to Bypass New Windows Defender Behavior Signatures Introduction I’ve got a short post today based on some recent changes by Windows Defender. Over the weekend, I noticed that some of my unit tests began failing on code that had not been recen…
21.11.2024 17:04 — 👍 2    🔁 1    💬 0    📌 0
Preview
New AMSI Bypss Technique Modifying CLR.DLL in Memory Introduction Recently, Microsoft has rolled out memory scanning signatures to detect manipulation of security critical userland APIs such as AMSI.dll::AmsiScanBuffer. You can read about the details…

Check out this new AMSI bypass released with SpectersInsight 4.0.0! This technique enables loading of .NET binaries without detection. Implementations in C, C#, and PowerShell provided.

practicalsecurityanalytics.com/new-amsi-byp...

21.11.2024 15:35 — 👍 0    🔁 1    💬 0    📌 0
Preview
GitHub - nccgroup/ScoutSuite: Multi-Cloud Security Auditing Tool Multi-Cloud Security Auditing Tool. Contribute to nccgroup/ScoutSuite development by creating an account on GitHub.


Tools
Cloud Auditing Tool - github.com/nccgroup/ScoutSuite

Post-Exploitation toolset
github.com/dafthack/GraphRunner

Find gaps within Azure MFA requirements.
github.com/absolomb/FindMeAccess

BloodHound github.com/BloodHoundAD/AzureHound

Azure AD hacking & admin
github.com/Gerenios/AADInternals

20.11.2024 22:01 — 👍 4    🔁 2    💬 1    📌 0
A photograph of the keyboard from an ADM-3A terminal. Arrows can be seen on the H, J, K, and L keys; left, down, up, and right arrows respectively

A photograph of the keyboard from an ADM-3A terminal. Arrows can be seen on the H, J, K, and L keys; left, down, up, and right arrows respectively

If you ever wondered why vi uses h, j, k, and l for cursor movement: it's because it was written using an ADM-3A terminal, which had a keyboard that looked like this

20.11.2024 00:11 — 👍 108    🔁 28    💬 7    📌 2

Hello World!

20.11.2024 00:13 — 👍 2    🔁 0    💬 1    📌 0

@cowbe is following 20 prominent accounts