M1ck3yS3c's profile picture. Pentester, Otaku and Music nerd

M1ck3y

@M1ck3yS3c

Pentester, Otaku and Music nerd

M1ck3y reposted

And here are the slides for my @BSidesSATX talk this afternoon: speakerdeck.com/0xc0da/kicksta… Thank you @BSidesSATX for having us! The conference was awesome and the crew is outstanding. Great job!


M1ck3y reposted

Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential Guard. These techniques also work on victims logged on before the server was compromised. research.ifcr.dk/pass-the-chall…


M1ck3y reposted

Let the Black Friday begin! 25% off from the regular price. To get the discount use the code: BEFICOM-22 Cyber Monday is a deadline, so don't wait too long! institute.sektor7.net #RTO #redteam #onlinelearning

SEKTOR7net's tweet image. Let the Black Friday begin!

25% off from the regular price.

To get the discount use the code: BEFICOM-22

Cyber Monday is a deadline, so don't wait too long!
institute.sektor7.net

#RTO  #redteam #onlinelearning

M1ck3y reposted

Offensive and defensive cybersecurity teams are not natural enemies, so why not collaborate more often? Join our hands-on attack-defense purple team training at BruCON on the 27th & 28th of September in Mechelen! eventbrite.co.uk/e/brucon-0x0e-… #redteam #BlueTeam #purpleteam @brucon

eventbrite.co.uk

BruCON 0x0E Training

Immerse yourself into the world of security by attending the BruCON Training ! We have enough options for red and/or blue teams


M1ck3y reposted

Want to know how to become a great pentester/red teamer? Learn these few things a 🧵: 1/4


So many concepts I would like to learn at the same time… Really easy to be all over the place in this field 😅


M1ck3y reposted

A lot of times when I provide Brute Ratel demos, I get a tonne of questions on detection, so here goes a rant on how detections are usually built. First and the most basic detections are static signature based. (1/15)


M1ck3y reposted

ScareCrow 4.0 is out now, with a huge update to the entire framework. Highlights are new evasion features, several bug fixes, numerous IoC's stripped out, added Garble, and more. Check it out: github.com/optiv/ScareCrow #netsec #redteam #EDR #evasion


M1ck3y reposted

#OffensiveCon22 talks are now up on our YouTube channel! enjoy :) youtube.com/playlist?list=…


M1ck3y reposted

This new book by Corey Ball (@hAPI_hacker) has been called "the Motherload for API hacking," with good reason! Don't go another day without it: nostarch.com/hacking-apis

nostarch's tweet image. This new book by Corey Ball (@hAPI_hacker) has been called "the Motherload for API hacking," with good reason! Don't go another day without it: nostarch.com/hacking-apis

M1ck3y reposted

Happy Easter.

The Easter bunny is here with a brand new course and discount code. Offensive Driver Development takes you through how to build a Windows kernel-mode driver from start to finish. Use the code EASTER22 at checkout for 10% off. courses.zeropointsecurity.co.uk/courses/offens…



M1ck3y reposted
elonmusk's tweet image.

M1ck3y reposted

Interested in covert code injection? @modexpblog outlines some techniques using COM in a new post "Process Injection via Component Object Model (COM) IRundown::DoCallback()" mdsec.co.uk/2022/04/proces…

MDSecLabs's tweet image. Interested in covert code injection? @modexpblog outlines some techniques using COM in a new post "Process Injection via Component Object Model (COM) IRundown::DoCallback()" mdsec.co.uk/2022/04/proces…

M1ck3y reposted

Do you want a FREE seat to Advanced Threat Emulation: Evasion? Retweet and comment below and we will be randomly selecting 1 person on Monday at 8am PST to attend our brand-new course. eventbrite.com/e/advanced-thr…


It’s really interesting to see how gatekeeping certs are becoming less accessible. It’s like they are really trying to tank the cyber sec industry.


M1ck3y reposted

As a follow up to my blog post about SysWhispers, I'm releasing SysWhispers3, an Inceptor-friendly version of SysWhispers2 with x86/WOW64 support, egg-hunting, direct jumps, and randomized jumps to syscall/sysenter instruction. More info in the repo: github.com/klezVirus/SysW…


M1ck3y reposted

hey 👋 wanna UAC bypass without dll hijacking? check out that amazing trick with only 2 RPC requests by James Forshaw. I wrote a simple PoC for demo, basically rewritten from UACMe. github.com/aaaddress1/PR0…


M1ck3y reposted

❌ Learn, learn, learn, learn, do ✅ Learn, do, learn, do, learn, do


M1ck3y reposted

It's always DNS. Even in politics.


United States Trends

Loading...

Something went wrong.


Something went wrong.