This would be a great addition! Gaining the ability to decouple BOF execution from the parent beacon’s tradecraft would definitely help reduce pattern-based detection.
Still wrapping my head around all the nuances here, but its a really interesting approach to compartmentalizing exposure 👍
31.12.2025 23:05 — 👍 2 🔁 0 💬 0 📌 0
NoooOOOooooooOoOo… I can’t help but wonder though.. what the vector/vuln/duration details will be blamed
02.10.2025 22:07 — 👍 0 🔁 0 💬 0 📌 0
Being relatively new to this space, I have a short list of veterans that I follow and that have inspired me.
Who do you draw inspiration from?
#RedTeam #Mudge #ironcat #plaintext #deviousrenegade
28.09.2025 18:45 — 👍 0 🔁 0 💬 0 📌 0
Two-panel: left ‘Planted Trail’ dense with nodes and notes; right ‘Real Channel’ minimal with locked padlock.
Alt text : WE ARE IN THE STORY CREATION BUSINESS
Built this into HBV’s HoneyTrails — toggleable persona drops that mimic style and intent without verbatim TTP copying.
Measuring believability is the hard part: what one metric do you trust when judging a decoy?
@raphaelmudge.bsky.social
#HBV #HoneyTrails
27.09.2025 19:14 — 👍 0 🔁 0 💬 0 📌 0
Three-step infographic: 1 Plant artifacts, 2 Make trails believable, 3 Maintain separate low-noise channel.
Model:
1.Plant believable artifacts — timestamps, user-behavior, tool-usage.
2.Make trails plausible to humans and timelines (logs, pivot maps).
3.Keep a separate, ultra-low-noise channel for real access & exfiltration.
Result:
Defenders fixate on the decoy; you buy operational tempo.
#Tradecraft
27.09.2025 19:06 — 👍 0 🔁 0 💬 0 📌 0
Graphic: text ‘Stealth = Narrative Control’ with a magnifying glass hovering over a breadcrumb trail.
On “stealth”: it isn’t just hiding — it’s narrative control. If defenders believe the story you plant, they’ll spend cycles chasing it. Curious how the community balances plausible noise vs operational fidelity. #RedTeam #AdversaryEmulation #HBV
27.09.2025 18:58 — 👍 0 🔁 0 💬 0 📌 0
Life is full of journeys. This marks the beginning of my journey on this platform.
Back at the beginning of summer, I had a very rare chance of meeting someone that was very inspirational in my cyber journey.
No shit, there I was. Right in the middle of an exercise picking locks with a VIP!!
25.09.2025 01:14 — 👍 0 🔁 0 💬 0 📌 0
Anyone else have an alter-ego?
24.09.2025 23:06 — 👍 0 🔁 0 💬 0 📌 0
Summarizes the hottest content on r/cybersecurity once per hour. Warning, the summaries are generated by an LLM and are not guaranteed to be 100% correct. Operated by @tweedge.net, open source @ https://github.com/r-cybersecurity/best-of-bot
Senior Intelligence Analyst at Red Canary, former DFIR at Mandiant. Psychology and history nerd. When I am not computering, I go outside and play!
Daily Global Cyber Incident Briefs for Busy Executives.
Fresh in your inbox every morning.
Start Your 14-Day Free Trial !
www.breachwire.io
| CyberSecurity | Reverse Engineering | C and Rust | Exploit | Linux kernel | PhD | Only My Opinions :) |
Retired software engineer. Enjoy photography, basset hounds, and sane politics. Currently clerk at Horsham Friend’s Meeting. More old interests than I can name
It was a lot more fun being 20 in the 70’s than being 70 in the 20’s.
Wannabe security guy. Director @ Zero-Point Security.
Dad, husband & Security dinosaur: lots of SecEng ⚙️, Redteam ☠️ DFIR ⛑️. Passion for National Security 🇺🇸🇨🇦🇫🇷, Coding 💻 & Space 🚀
https://linkedin.com/in/jmamblat
A newsletter dedicated to reforming the practice of science through rigorous debate. Metascience | open science | statistics
Subscribe at redteamofscience.com
Artist, Fabricator, Offsec Engineer
Minneapolis
He/Him
Former NSA hacker; Cyber Expert; Current CISO, TV Cyber Expert & Keynote Speaker
Twitch.tv/cyber_insecurity
topmate.io/neal_bridges
https://linktr.ee/cyber_insecurity
#cybersecurity #redteam #hacking #blueteam #securityoperations #ciso
RedTeam | Pentest
Author of PayloadsAllTheThings & SSRFmap
http://github.com/swisskyrepo
Adversary Simulation, Red Team Lead, Security Research @ LFI
Posts are my own
He/Him
#redteam #offsec #malware #cybersecurity
https://secdsm.org
I use my real name. The trick is figuring out my handles
@natesubra@infosec.exchange
SANS Principal Instructor & Author #SEC565 | #RedTeam | #PurpleTeam | #PenTest | #C2Matrix Creator | ATT&CK & Atomic Red Team Contributor | Published Author
A leading provider of #offensivesecurity solutions & contributor to the #infosec community. #pentesting #hacking
Data breach revealed,
Malware lurks, silent, stealthy -
OSINT tracks the thread.
URLs I post may contain malware – be careful and check yourself before running anything.
https://github.com/r1cksec
infosec.exchange/@r1cksec
Live hacking content https://truecyber.world/
Red team training https://mr.un1k0d3r.world/training/
Github https://github.com/Mr-Un1k0d3r
Official account for Cobalt Strike. Benchmark red teaming tool known for its flexibility and powerful user community. Follow for new releases and other updates.
Deputy Chief Red Team @ CISA && BJJ && Open Source Dev
frontend developer and consultant
HTML, CSS, accessibility
big fan of <button>s
creator of HTMHell
author of the Web Accessibility Cookbook
Infosec professional, beverage snob, and fantasy book consumer. Vice President @ Atredis Partners. Forever terrified of Kithicor.