hackingforbeer's profile picture. yeah nah, janitor. copy pasting through your network. floppy saves

potatoherder

@hackingforbeer

yeah nah, janitor. copy pasting through your network. floppy saves

Pinned

potatoherder reposted

Exciting news, infosec community! 🎉 The Call for Proposals for x33fcon is officially OPEN! Got a brilliant talk idea, a hands-on workshop, or an in-depth training you're eager to share? We want to hear from you! Conference dates: June 11-12, 2026 Training dates: June 8-10,…

x33fcon's tweet image. Exciting news, infosec community! 🎉 The Call for Proposals for x33fcon is officially OPEN!

Got a brilliant talk idea, a hands-on workshop, or an in-depth training you're eager to share? We want to hear from you!

Conference dates: June 11-12, 2026 
Training dates: June 8-10,…

potatoherder reposted

CAIBench: How do we really know how good an agent is at hacking? 🧠💥 Evaluation is a core pillar of agentic AI — especially in cybersecurity agents built for vulnerability hunting, offensive operations, blue-team defense, and purple-teaming. Benchmarks aren’t side projects;…

luijait_'s tweet image. CAIBench: How do we really know how good an agent is at hacking? 🧠💥

Evaluation is a core pillar of agentic AI  — especially in cybersecurity agents built for vulnerability hunting, offensive operations, blue-team defense, and purple-teaming. Benchmarks aren’t side projects;…
luijait_'s tweet image. CAIBench: How do we really know how good an agent is at hacking? 🧠💥

Evaluation is a core pillar of agentic AI  — especially in cybersecurity agents built for vulnerability hunting, offensive operations, blue-team defense, and purple-teaming. Benchmarks aren’t side projects;…

potatoherder reposted

Venom C2 tool drop! 🐍 During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. Some had EDR so we didn't want anything off-the-shelf. The server, agent, and client were made…

0xBoku's tweet image. Venom C2 tool drop! 🐍

During a recent red team engagement we needed a simple python agent that needs no dependencies to setup persistence on some exotic boxes we landed on. 

Some had EDR so we didn't want anything off-the-shelf.
The server, agent, and client were made…

potatoherder reposted

Think NTLM relay is a solved problem? Think again. @elad_shamir breaks down why it remains one of the easiest, and most effective, attack paths in AD environments. Read more from @helpnetsecurity ⤵️ ghst.ly/47Pv7WZ


potatoherder reposted

[Blogpost] @croco_byte presents how to exploit attack paths related to Active Directory sites' ACLs. As the latter often constitute a blind spot for AD enumeration tools, the article also describes a pull request aiming to integrate them into the BloodHound project:…


potatoherder reposted

As a fun side project - I’ve started tracking vendors whose guides ask customers to create ESC1-style certificate templates, leaving an entire environment exposed 😅 medium.com/@Debugger/from…


potatoherder reposted

Callstacks are largely used by the Elastic EDR to detect malicious activity. @SAERXCIT details a technique to evade a callstack-based detection and allow shellcode to load a network module without getting detected. Post: offsec.almond.consulting/evading-elasti… PoC: github.com/AlmondOffSec/L…

AlmondOffSec's tweet image. Callstacks are largely used by the Elastic EDR to detect malicious activity. @SAERXCIT details a technique to evade a callstack-based detection and allow shellcode to load a network module without getting detected.
Post: offsec.almond.consulting/evading-elasti…
PoC: github.com/AlmondOffSec/L…

potatoherder reposted

If you’re a hacker or infosec pro, you should definitely read the short paper, Reflections on Trusting Trust by Ken Thompson. cs.cmu.edu/~rdriley/487/p…

nyxgeek's tweet image. If you’re a hacker or infosec pro, you should definitely read the short paper, Reflections on Trusting Trust by Ken Thompson.

cs.cmu.edu/~rdriley/487/p…

potatoherder reposted

New Titanis release => github.com/trustedsec/Tit… Mostly Kerberos enhancements: - S4U2self and S4U2proxy - Change/Set password - Generate crypto key on command line ASN.1 saw some major changes to pave the way for some upcoming enhancements


potatoherder reposted

This is already happening and it's exactly as bad as you'd expect. Zerodium pays $2.5M for iOS exploits. NSO Group turned this into a business model. Zero-days get hoarded by nation-states instead of fixed. The data: Researches from Rand found exploited zero-days have a…

hot take: maybe instead of reporting vuln and getting cves, security nerds should just sell exploits that way devs won't need to bother with too much reports, only critical one that got exploited would need to be fixed. neat!



potatoherder reposted

Really great blogpost about bypassing client isolation on wifi networks (WPA till 2 and public) from Ben Knight pulsesecurity.co.nz/articles/bypas…


potatoherder reposted

Today, I am releasing the COM-Fuzzer. Gain insights into COM/DCOM implementations that may be vulnerable using an automated approach and make it easy to visualize the data. github.com/warpnet/COM-Fu…


potatoherder reposted

No, I don't think it's staged. I really recommend reading this paper by RecordedFuture, in summary they believe there is some changes occurring in the Russian Federation and they're less tolerant to cybercrime unless it benefits them recordedfuture.com/research/dark-…


potatoherder reposted

Hundreds of leaked EDR credentials are circulating. Because EDRs have deep device access, this is like handing over your C2. This issue doesn’t stem from vulnerabilities in the EDR products themselves, but rather from end users who inadvertently download and execute malware.

whiteintel_io's tweet image. Hundreds of leaked EDR credentials are circulating. Because EDRs have deep device access, this is like handing over your C2. This issue doesn’t stem from vulnerabilities in the EDR products themselves, but rather from end users who inadvertently download and execute malware.

potatoherder reposted

Tools such as PsExec.py from Impacket are usually flagged for lateral movement due to the pre-built service executable that is dropped on the remote system. However, some vendors also flag Impacket based on its behaviour. With RustPack, you can easily create…


potatoherder reposted

We have a AMA from @anyrun_app currently talking malware in /r/redteamsec if you want to join the conversation - reddit.com/r/redteamsec/s…


potatoherder reposted

Raw NTFS parsing for SAM/SYSTEM/NTDS.dit access? github.com/kfallahi/Under… 400 lines Powershell - easy peasy ❤️🔥

ShitSecure's tweet image. Raw NTFS parsing for SAM/SYSTEM/NTDS.dit access?

github.com/kfallahi/Under…

400 lines Powershell - easy peasy ❤️🔥

potatoherder reposted

if you are in red team and you are worried about future employment, or AI. learn code. learn system internals. make simple malware, use AI assistance. become an engineer. learn how malware operates and why. think how to evade security while accomplishing your objectives in code


potatoherder reposted

Took a bit of time, but it seems I got the MythicC2 HTTPx profile implemented for the Apollo agent. The C# agent now has full mallable profile support🔥 Needs way more testing before any sort of merge, but it's getting there 😃

Flangvik's tweet image. Took a bit of time, but it seems I got the MythicC2 HTTPx profile implemented for the Apollo agent. The C# agent now has full mallable profile support🔥 Needs way more testing before any sort of merge, but it's getting there 😃

potatoherder reposted

Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec mdsec.co.uk/2025/10/functi…

MDSecLabs's tweet image. Interested in an alternative approach to sleep masking for you malware? Check-out our latest blog post "Function Peekaboo: Crafting self masking functions using LLVM" by @saab_sec mdsec.co.uk/2025/10/functi…

Loading...

Something went wrong.


Something went wrong.