bitsadmin's profile picture. Windows Offensive Security Enthusiast 🤠

Blog: http://blog.bitsadmin.com
GitHub: http://github.com/bitsadmin

Arris Huijgen

@bitsadmin

Windows Offensive Security Enthusiast 🤠 Blog: http://blog.bitsadmin.com GitHub: http://github.com/bitsadmin

Arris Huijgen reposted

[Research] Starting Chrome Exploitation with Type Confusion 101 ^-^☆ Part 1.(EN) hackyboiz.github.io/2025/07/01/OUY… Ever wondered how Chrome's V8 engine actually runs JavaScript, and how those internals can lead to security issues like Type Confusion? In this post, I break down the V8…

hackyboiz's tweet image. [Research] Starting Chrome Exploitation with Type Confusion 101 ^-^☆ Part 1.(EN)

hackyboiz.github.io/2025/07/01/OUY…

Ever wondered how Chrome's V8 engine actually runs JavaScript, and how those internals can lead to security issues like Type Confusion?
In this post, I break down the V8…

Arris Huijgen reposted

🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️ Read Here - akamai.com/blog/security-…

YuG0rd's tweet image. 🚀 We just released my research on BadSuccessor - a new unpatched Active Directory privilege escalation vulnerability
It allows compromising any user in AD, it works with the default config, and.. Microsoft currently won't fix it 🤷‍♂️
Read Here - akamai.com/blog/security-…

Arris Huijgen reposted

What if you skipped VirtualAlloc, skipped WriteProcessMemory and still got code execution? We explored process injection using nothing but thread context. Full write-up + PoCs: blog.fndsec.net/2025/05/16/the…


Arris Huijgen reposted

Blogpost from my colleague about what’s still possible with recently published COM/DCOM toolings, Cross Session Activation and Kerberos relaying 🔥 r-tec.net/r-tec-blog-win…


Arris Huijgen reposted

ProxyBlob is alive ! We’ve open-sourced our stealthy reverse SOCKS proxy over Azure Blob Storage that can help you operate in restricted environments 🔒 🌐 github.com/quarkslab/prox… Blog post for more details right below ⬇️

Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure. Check out @_atsika's article on how it came to exist after an assumed breach mission ⤵️ 👉 blog.quarkslab.com/proxyblobing-i…

quarkslab's tweet image. Look at those cute little blobs in your internal network. They look harmless, but how about the one carrying SOCKS? It's ProxyBlob, a reverse proxy over Azure.
Check out @_atsika's article on how it came to exist after an assumed breach mission ⤵️
👉 blog.quarkslab.com/proxyblobing-i…


Cool, novel, lateral movement technique by @william_knows by dropping a .dll file on a remote host obtaining code execution! 💡

bitsadmin's tweet image. Cool, novel, lateral movement technique by @william_knows by dropping a .dll file on a remote host obtaining code execution! 💡

.NET GAC and NIC hijacking for lateral movement: williamknowles.io/net-gac-and-ni…



Arris Huijgen reposted

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…


Arris Huijgen reposted

The S is for Security. How to use WinRMS as a solid NTLM relay target, and why it’s less secure than WinRM over HTTP. By @Defte_ Writeup: sensepost.com/blog/2025/is-t… PR to impacket: github.com/fortra/impacke… Demo: youtu.be/3mG2Ouu3Umk

sensepost's tweet card. WinRMS Relaying

youtube.com

YouTube

WinRMS Relaying


Arris Huijgen reposted

We’re glad to announce we released Soxy!🚀 A Rust-powered suite of services for Citrix, VMware Horizon & Windows RDP. Red teams & pentesters can use it to pivot for deeper access. Get the tool and more details: 🔗 github.com/airbus-seclab/…


Arris Huijgen reposted

Your laptop was stolen. It’s running Windows 11, fully up-to-date, device encryption (BitLocker) and Secure Boot enabled. Your data is safe, right? Think again! This software-only attack grabs your encryption key. Following up on our #38C3 talk: neodyme.io/blog/bitlocker…

neodyme.io

Windows BitLocker -- Screwed without a Screwdriver

Breaking up-to-date Windows 11 BitLocker encryption -- on-device but software-only


Arris Huijgen reposted

How to bypass BitLocker encryption on Windows 11 noinitrd.github.io/Memory-Dump-UE…


Arris Huijgen reposted

Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin! github.com/CrowdStrike/sc…

doopsec's tweet image. Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast 
amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin!

github.com/CrowdStrike/sc…

Loading...

Something went wrong.


Something went wrong.