rd_pentest's profile picture. Penetration Tester. CREST CCT | OSCE | OSCP | OSWP

Richard Davy

@rd_pentest

Penetration Tester. CREST CCT | OSCE | OSCP | OSWP

고정된 트윗

Bypassing AMSI in Office 365 x64 x86 - bit.ly/2YiOfHr


Richard Davy 님이 재게시함

Microsoft is Offering FREE Azure 2025 Certification Courses! No Fee, Completely Free These 20 Courses Includes Video Tutorials, Hand's on Labs and Notes. Don't miss these courses if you want to make your career in 2025:

HeyZoyaKhan's tweet image. Microsoft is Offering FREE Azure 2025 Certification Courses!

No Fee, Completely Free

These 20 Courses Includes Video Tutorials, Hand's on Labs and Notes.

Don't miss these courses if you want to make your career in 2025:

Richard Davy 님이 재게시함

Powerful technique to quickly improve how you speak


I got asked to put a quick demo together after a recent engagement to show how easy it is to abuse disconnected RDP sessions from local admin. Thought I’d share in case useful secureyourit.co.uk/wp/2024/11/07/…


Richard Davy 님이 재게시함

Curious about Cobalt Strike's #UDRL capabilities? Get a walkthrough on how to easily develop custom loaders. cobaltstrike.com/blog/revisitin…

_CobaltStrike's tweet image. Curious about Cobalt Strike's #UDRL capabilities? Get a walkthrough on how to easily develop custom loaders.
cobaltstrike.com/blog/revisitin…

serviceui.exe - a useful lolbin I came across on a pentest a while back that I thought I'd share. secureyourit.co.uk/wp/2024/11/02/… @Oddvarmoe #lolbas #lolbin


Richard Davy 님이 재게시함

DonPAPI users I have pushed quite a few things lately! Hopefully you'll like it and here is a recap (1/x)


Richard Davy 님이 재게시함

Intro for beginners to embedded devices reverse engineering Ghidra setup: voidstarsec.com/blog/ghidra-de… Tools: voidstarsec.com/blog/intro-to-… Firmware extraction: voidstarsec.com/blog/uart-uboo… Credits @voidstarsec #reverseengineering #infosec

0xor0ne's tweet image. Intro for beginners to embedded devices reverse engineering

Ghidra setup: voidstarsec.com/blog/ghidra-de… 
Tools: voidstarsec.com/blog/intro-to-… 
Firmware extraction: voidstarsec.com/blog/uart-uboo… 

Credits @voidstarsec

#reverseengineering #infosec

Richard Davy 님이 재게시함

Windows Internals Crash Course (62 minutes from the creator of x64dbg) - because you’ll find Windows in cars, robots, and manufacturing IoT. 😎💻🛠 Course: youtube.com/watch?v=I_nJlt… Slides: mrexodia.github.io/files/wicc-202… Materials: mrexodia.github.io/files/wicc-202…

it4sec's tweet image. Windows Internals Crash Course (62 minutes from the creator of x64dbg) - because you’ll find Windows in cars, robots, and manufacturing IoT. 😎💻🛠

Course: youtube.com/watch?v=I_nJlt…
Slides: mrexodia.github.io/files/wicc-202…
Materials: mrexodia.github.io/files/wicc-202…

Richard Davy 님이 재게시함

Microsoft Copilot: From Prompt Injection to Exfiltration of Personal Information · Embrace The Red embracethered.com/blog/posts/202…


Richard Davy 님이 재게시함

“I am a very innocent man” - Donald Trump

PoliticsJOE님으로부터

Richard Davy 님이 재게시함

🚨 #NetExec v1.2.0 (codename "ItsAlwaysDNS") has been OFFICIALLY released. There are too many amazing features, modules, and bugfixes to talk about all of them (just look at the notes 🤯github.com/Pennyw0rth/Net…), but the codename is because you can now specify a DNS server!


Richard Davy 님이 재게시함

My new article revisits classic technique Reflective Loading, and explains my tool InflativeLoading. winslow1984.com/books/malware/… Thank @0xBoku @MalDevAcademy @stephenfewer @hasherezade and all other authors(and their articles/tools/projects) for the inspiration and help


Richard Davy 님이 재게시함

This is a great blog by @Tw1sm Tldr; Compromise workstations by coercing machine account HTTP authentications and relaying them to LDAP to set shadow credentials on the computer object. Then extract the NT hash, create a silver ticket, move laterally 🔥 fortalicesolutions.com/posts/shadow-c…


Richard Davy 님이 재게시함

Don’t rely on motivation.


Richard Davy 님이 재게시함

This has to become Christmas Number one …

Phil Clifton님으로부터

Richard Davy 님이 재게시함

I've used Evilginx plenty of times for engagements and unfortunatly have seen it abused in the wild. Decided to make a post on how to protect against modern phishing attacks using different methods - inspired by @merill bleekseeks.com/blog/how-to-pr…


Richard Davy 님이 재게시함

Today, I have a question. A pressing question. For some Western feminists. How can you remain silent, when women and girls are raped, tortured, their bodies carried around naked and spat on by bearded men shouting Allah Akbar? Then you can never call yourself a feminist again.…


Richard Davy 님이 재게시함

🚨 BBC forced to apologise for getting caught reporting shocking fake news Pass it on for the world to see

We Stand With Israel님으로부터

Loading...

Something went wrong.


Something went wrong.