Scriptmonkey_
@scriptmonkey_
Tester of Pens, Ex-Teamer of Red things, now with a more purpley shade. Biker and Recovering Eve-Online Addict. o7 [email protected] & http://bsky.social
You might like
Bang on Iain! As much as the example in the blog post works, getting c2 over any form of filesystem, is the real gem here. Even locally for privesc, get a system shell without worrying about proxies for example. Looking forward to see what folk come up with use case wise.
This is such a cool C2 channel technique. Use network file share, RDP mapped drives and anywhere else more than one host sees the same filesystem as a C2 channel which really doesn't get logged. Simple but effective!
Just released a blog exploring python package management: dtm.uk/badpie/
Really great training sesh with @SinSinology brill workshop. Definitely recommend it and the 4 day training with @watchtowrcyber
Croeso BSides Aberystwyth, bydded i ni fod y cyntaf i'ch croesawu a phob lwc ym mis Tachwedd! bsidesaberystwyth.org #Security #BSides #Aberystwyth #BSidesAberystwyth
FileFix - A ClickFix Alternative mrd0x.com/filefix-clickf…
This is my research project in creating read, write and allocate primitives that can be turned into an injection in order to evade certain telemetry which I presented last year in RedTreat. I hope everyone likes it \m/. trickster0.github.io/posts/Primitiv…
When your team is reading TI reports for an upcoming exercise and goes "No way, There is no way a proper APT would ever do something as basic as this..." introducing APT herptyderp
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. volexity.com/blog/2024/11/2… And yet... they got caught doing this!
This hack is brilliant, APT28 hopping into a target environment over wifi by compromising neighbouring companies and finding a dual-homed host within range. volexity.com/blog/2024/11/2… And yet... they got caught doing this!
Just made an account over on BSky. Come find me :) bsky.app/profile/script… Gives off real classic twitter vibes.
Great article with lots of details about attacks that happen irl. We should remember that many orgs don't require MFA from on-prem. Also, service accounts (i.e. entra sync account) won't have MFA. Threat Actors can also use PRTs and Access tokens to access M365/Azure.
The financially motivated cybercriminal group that Microsoft tracks as Storm-0501 has been observed exfiltrating data and deploying Embargo ransomware after moving laterally from on-premises to the cloud environment. msft.it/6013m5gnf
Understanding EVERY Token in Entra ID 🔎 Not all tokens are equal. There are many different types with different uses and benefits. In this blog, I break down each token and what they are used for and which tokens are the most "valuable" for an attacker to obtain. Full blog…
The typical right-wing nutter... In response to JSO: "Protesting shouldn't inconvenience the public! This is illegal! People should run them over! They hurt our emergency services!" In response to #UKRiots: "i'm gonna nick some crocs, punch a copper and set fire to a shop"
Teaching the Old .NET Remoting New Exploitation Tricks – read how @mwulftange developed novel techniques to exploit Apache log4net's hardened .NET Remoting service: code-white.com/blog/teaching-…
📢 New blog post out! 💡 I've been working on this blog for quite some time and I am honored and very happy I was given the opportunity from @alexverboon and @castello_johnny to present this in today's @KqlCafe. ➡️ Windows Linux Subsystem (WSL) by itself is a blind spot within…
Another year, another @Steel_Con. Once again proving why its one of my favourite cons to go to. Great time seeing old friends, meeting new ones and catching great talks including one on norse mythology and threat modelling 😁 also my arm now belongs to a sponsor 😅
CTF details. Link below for our awesome Ctf brought to you by our partners @hackrocks_ and @hacktoria. 6 awesome challenges that give you the APIs for our arena, wanna fire our flipper ??? Get registered and crack our awesome challenges @BSidesBSK infosecbattlebots.hackrocks.com
I've made some long awaited updates to SQLRecon! Here's a couple of videos highlighting some of the big additions. Tool: github.com/xforcered/SQLR… Check out this thread ⬇️
Teams needs a "don't notify on @everyone or @<channel name>" like discord. Stat. This is worse than "reply all".
Domain Admin credentials delivered across the network to workstations and servers
Laughs in ham radio.
How I acquire new shit I don't need... "Hmm this would be a cool sticker..." *hmm £50 to get 100, I dont need 100, but there are a few things I'd probably like stickers of* *hmm... additional designs cost extra* "I wonder how much a vinyl cutter costs?" *visits hobbycraft*
United States Trends
- 1. Clippers 13.6K posts
- 2. Harden 9,885 posts
- 3. #DWTS 49.5K posts
- 4. Ty Lue 1,448 posts
- 5. Huda 7,631 posts
- 6. Giannis 28.9K posts
- 7. Kawhi 3,532 posts
- 8. #RHOSLC 7,452 posts
- 9. Whitney 15.5K posts
- 10. #DearOlandria N/A
- 11. Askarov N/A
- 12. #capcut N/A
- 13. Markstrom 1,681 posts
- 14. #APEC2025 59.6K posts
- 15. Caden 8,270 posts
- 16. Ryan Rollins 3,040 posts
- 17. Brunson 7,153 posts
- 18. Connor Bedard 5,001 posts
- 19. Zubac 1,666 posts
- 20. Chris Paul 1,530 posts
You might like
-
@[email protected]
@christruncer -
Ben Turner 🇬🇧
@benpturner -
Harley Lebeau
@r3dQu1nn -
Dominic Chell 👻
@domchell -
Cn33liz
@Cneelis -
Dwight Hohnstein
@djhohnstein -
CCob🏴
@_EthicalChaos_ -
obscuresec
@obscuresec -
myexploit2600
@myexploit2600 -
DTM
@dtmsecurity -
Rob Maslen
@rbmaslen -
Dave Cossa
@G0ldenGunSec -
SteelCon
@Steel_Con -
Stu Kennedy
@NoobieDog -
PortcullisLabs
@portcullislabs
Something went wrong.
Something went wrong.