Taking them to the SHITTER: an analysis of vendor abuse of security research in-the-wild
aff-wg.org/2025/07/13/t...
(There is no benefit modulating my voice for anyone's comfort. This is my fair take, but unapologetic truth. This phenomena has gone unchecked for too long)
14.07.2025 14:05 β π 10 π 7 π¬ 1 π 0
To exploit BadSuccessor there are only two requirements:
- At least one DC is server 2025
- Access to a user with at least "create child all" privileges over an OU
The same user that has the abuse privileges over the OU and creates the DMSA can also be assigned retrieve the pass.
22.05.2025 11:41 β π 2 π 0 π¬ 0 π 0
Thank you for your continuous contribution and such a great support! Mythic is Awesome!
16.04.2025 09:43 β π 2 π 0 π¬ 0 π 0
Post-ex Weaponization: An Oral History
aff-wg.org/2025/04/10/p...
A walk-through of some history on post-ex eco-systems used by CS (PowerShell, Reflective DLLs, .NET, and BOFs).
Ends with a coffee conversation talking about magician's guilds, security research, and ideas about what's next.
10.04.2025 14:24 β π 12 π 7 π¬ 0 π 2
YouTube video by Sense Post
WinRMS Relaying
The S is for Security. How to use WinRMS as a solid NTLM relay target, and why itβs less secure than WinRM over HTTP.
writeup: sensepost.com/blog/2025/is...
PR to impacket:
github.com/fortra/impac...
Demo: youtu.be/3mG2Ouu3Umk
14.04.2025 16:40 β π 11 π 10 π¬ 1 π 0
Imagine a discipline called Breach Intelligence. Instead of describing breaches as tools+actors, we use root-cause analysis to dissect the attack path, identify contrib factor issues, and their mitigations. And, aggregate data about which compensating controls (security products) failed
15.03.2025 03:57 β π 8 π 2 π¬ 1 π 0
Check if you have an email address or password that has been compromised in a data breach. Created and maintained by
@troyhunt.com.
Hacker, Rapper, Developer, dade.
https://0xda.de
Pentester
Wannabe Red Teamer
AD/Entra enthusiast
I hate reading other people's code. So I wrote mine, made it as open source project, and watch others suffer.
CTO of Microsoft Azure, author of novels Rogue Code, Zero Day and Trojan Horse, Windows Internals, Sysinternals tools. Opinions are my own.
Reverse engineer at FLARE/Google | Pluralsight author | π± 1M+ views on YT | ποΈ Host of Behind the Binary podcast π
Ported vx-underground from twitter.
vx-staff: if you want me to take it down, pm me
i'm not using to impersonate you!
We are the National Cyber Security Centre β part of the UKβs intelligence & cyber agency GCHQ. We help to make the UK the safest place to live and work online.
An Aussie who does cyber things | Manager @Huntress.com | Former Principal @CrowdStrike.com and HuntressLabs | https://jaiminton.com | https://www.youtube.com/@cyberraiju/featured
http://isc.sans.edu - Global Network Security Information Sharing Community - Daily blogs and cyber security news podcast.
Kali Linux, The Most Advanced Penetration Testing Distribution. Ever.
Professional hacker, accidental educator. Rhode Island is not an island.
Adversary Simulation | Wannabe
https://twitter.com/tw1sm
https://blog.tw1sm.io
Adversary Simulation Consultant @SpecterOps
https://github.com/werdhaihai