BinaryFaultline's profile picture.

Josh Hawkins

@BinaryFaultline

Pinned

New blog post and tooling: Introducing Striker and the Payload Automation Libraries. blog.redxorblue.com/2021/06/introd… A set of Python libraries to interact with Cobalt Strike to help script and automate custom payload generation.


Josh Hawkins reposted

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…


Josh Hawkins reposted

The wait is over…Choose your side!! Barely Human Official Video is live now!!! #LYLVC #judgeandjury #howardbenson #neilsanderson #altmetal #metalcore #raprock #rapmetal #posthardcore #activerock #rockmusic #rock #numetal #hardrock


Josh Hawkins reposted

I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it! - github.com/SpecterOps/MSS… - specterops.io/blog/2025/07/2…

_Mayyhem's tweet image. I'm SO hyped to finally make MSSQLHound public! It's a new BloodHound collector that adds 37 new edges and 7 new nodes for MSSQL attack paths using the new OpenGraph feature for 8.0!. Let me know what you find with it!
- github.com/SpecterOps/MSS…
- specterops.io/blog/2025/07/2…

Josh Hawkins reposted

Hiring a junior/mid role on my team for a Red Team operator, feel free to DM me with any questions or anything nvidia.wd5.myworkdayjobs.com/NVIDIAExternal…


Josh Hawkins reposted

Azure Arc is Microsoft's solution for managing on-premises systems in hybrid environments. My new blog covers how it can it be identified in an enterprise and misconfigurations that could allow it to be used for out-of-band execution and persistence. ibm.com/think/x-force/…


Josh Hawkins reposted

You can find my slide deck for @TheOffensiveX on GitHub. I also included a minimalist extension that you can build on and will load in any of the VSCode forks on any platform 👨‍💻⚔️

FuzzySec's tweet image. You can find my slide deck for @TheOffensiveX on GitHub. I also included a minimalist extension that you can build on and will load in any of the VSCode forks on any platform 👨‍💻⚔️

Josh Hawkins reposted

I'm happy to announce that my BOF Development and Tradecraft course on Zero Point Security is now part of their Purcharsing Parity Program (PPP). This means you can purchase the course at a potentially reduced price based on the country that you live in! zeropointsecurity.co.uk/course/bof-dev


Josh Hawkins reposted

🚨 New blog post alert! @_xpn_ drops knowledge on LLM security w/ his latest post showing how attackers can by pass LLM WAFs by confusing the tokenization process to smuggle tokens to back-end LLMs. ghst.ly/4koUJiz


Josh Hawkins reposted

Okay so this is HUGE - our amazing AI red team have open sourced their AI red team labs so you can set up your own training! aka.ms/AIRTlabs @ram_ssk


Josh Hawkins reposted

Back in 2023, the assessment of the pre-authentication vulnerability in SSH was that it wasn't exploitable on Linux. For my OffensiveCon 2025 keynote, I wrote enough of an exploit to show, with the right heap groom and stabilization, it's likely exploitable. Then I tried to have…

If someone get a working OpenSSH exploit from this bug, I'm switching my main desktop to Windows 98 😂 (this bug was discovered by a Windows 98 user who noticed sshd was crashing when trying to login to a Linux server!)



Josh Hawkins reposted

Me and the homies are dropping browser exploits on the red team engagement 😎. Find out how to bypass WDAC + execute native shellcode using this one weird trick -- exploiting the V8 engine of a vulnerable trusted application. ibm.com/think/x-force/…


Josh Hawkins reposted

Well I've sent my two emails for the day, time to put all my passwords in SharePoint and take a four hour lunch break


Josh Hawkins reposted

As promised... this is Loki Command & Control! 🧙‍♂️🔮🪄 Thanks to @d_tranman for his work done on the project and everyone else on the team for making this release happen! github.com/boku7/Loki


Josh Hawkins reposted

Many people wanted my slides from the Windows Client Privilege Escalation webinar yesterday. Here are links to the slides and the recording of the webinar. slideshare.net/slideshow/wind… youtu.be/EG2Mbw2DVnU?si…

Oddvarmoe's tweet card. Webinar - Windows Client Privilege Escalation

youtube.com

YouTube

Webinar - Windows Client Privilege Escalation


Josh Hawkins reposted

I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com. Co-organized by RemoteThreat, Dreadnode, & DEVSEC. The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,…

retBandit's tweet image. I am excited to announce the first conference dedicated to the offensive use of AI in security! Request an invite at offensiveaicon.com.

Co-organized by RemoteThreat, Dreadnode, & DEVSEC.

The Call for Papers opens Tuesday, March 25, 2025, and will remain open until Friday,…

Josh Hawkins reposted

Today I'm releasing Xenon, a custom Mythic agent for Windows targets written in C. Notable features include: 📁 Modular command/code inclusion 🦠 Malleable C2 Profile support 🪨 Compatible with Cobalt Strike BOFs github.com/MythicAgents/X… Blog series - c0rnbread.com/creating-mythi…


Josh Hawkins reposted

My intern research from IBM @XForce Red last summer just got released! Introducing SoaPy - a completely custom engineered way to use Active Directory Web Services (ADWS) from Linux hosts for stealthy Active Directory interaction! Read about it here! securityintelligence.com/x-force/stealt…


Josh Hawkins reposted

Going forward I'll only be publishing new tooling one line of code per week, and all new blogs will be meandering sports analogies. If you think this is silly then you're arming ATPs


Josh Hawkins reposted

I see we're doing the quarterly open source tools/research debate again. I'll just say this: Phishing got much harder when @mrgretzky released evilnginx AD got more secure after @SpecterOps released Certified Pre-Owned AD got more secure when @TimMedin showed us kerberoasting


Josh Hawkins reposted

Loki C2 is coming.. Cross-platform Stage 1 C2, battle-tested in ops for 8 months against the world’s leading EDRs and MSSPs, undetectable, bypasses Application Control/WDAC.. Shoutouts to @d_tranman for helping build the project, and @chompie1337 & @knavesec for inspiration!

0xBoku's tweet image. Loki C2 is coming..
Cross-platform Stage 1 C2, battle-tested in ops for 8 months against the world’s leading EDRs and MSSPs, undetectable, bypasses Application Control/WDAC..
Shoutouts to @d_tranman for helping build the project, and @chompie1337 & @knavesec for inspiration!

Loading...

Something went wrong.


Something went wrong.