NtAlexio2's profile picture. Offensive Developer | Cyber Security Enthusiast | Network Protocols Researcher | @Metasploit contributor | Enjoy breaking things and remaking them!

Packet Phantom

@NtAlexio2

Offensive Developer | Cyber Security Enthusiast | Network Protocols Researcher | @Metasploit contributor | Enjoy breaking things and remaking them!

Packet Phantom รีโพสต์แล้ว

Check out Titanis, my new C#-based protocol library! It features implementations of SMB and various Windows RPC protocols along with Kerberos and NTLM. github.com/trustedsec/Tit…


Packet Phantom รีโพสต์แล้ว

New Titanis release => github.com/trustedsec/Tit… Added Smb2 touch and timestomp (@freefirex2 ), Kerberos cross-realm support, and all commands support SOCKS 5. I also added build instructions for Linux/Windows.


Packet Phantom รีโพสต์แล้ว

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

YuG0rd's tweet image. 🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…

Packet Phantom รีโพสต์แล้ว

🚀 Launching TheManticoreProject – a long-term offensive & defensive security ecosystem in Go! First release (the core library): Manticore 🐾 🔧 Modular Go library to craft & interact with network protocols. ⚙️ SMB support coming soon. 🌐 github.com/TheManticorePr…


are unicellular creatures the God "hello world" program? 🤔


Packet Phantom รีโพสต์แล้ว

#pypykatz new version 0.6.11 is out on github and pip. Big thanks to all awesome contributors!! Besides the fixes, the two important things in this version: - Kerberos aes keys extraction is now supported - !!!!Windows 24H2 support is here!!!!! github.com/skelsec/pypyka…


Did you know you can get created process' id using wmiexec.py by adding --nooutput parameter? Thanks to @n0km for merging PR!


Packet Phantom รีโพสต์แล้ว

Are you ready for an introduction to Windows Kernel Race Conditions? You can find the tutorial below :) wetw0rk.github.io/posts/0x07-int…


Packet Phantom รีโพสต์แล้ว

Proof-of-concept for the AMSI bypass and an implementation of a CLR memory manager is on GitHub. We can implement custom memory routines and track all allocations made by the CLR. github.com/xforcered/Bein…


Packet Phantom รีโพสต์แล้ว

While waiting for a blog post about CVE-2024-49138 you can start reading this (It share similarities with poc for CVE-2024-49138)🙂: security.humanativaspa.it/from-arbitrary…


Loading...

Something went wrong.


Something went wrong.