secure_sean's profile picture. Stunt Hacker. CCDC Red Team

Sean Pierce

@secure_sean

Stunt Hacker. CCDC Red Team

Sean Pierce đã đăng lại

‼️ China's largest cybersecurity firm, Knownsec, was breached, exposing details of China's state cyber operations. The data includes cyberweapon documentation, internal hacking tool source code, and global target lists covering over 20 countries, including Japan, Vietnam, and…

IntCyberDigest's tweet image. ‼️ China's largest cybersecurity firm, Knownsec, was breached, exposing details of China's state cyber operations.

The data includes cyberweapon documentation, internal hacking tool source code, and global target lists covering over 20 countries, including Japan, Vietnam, and…

Sean Pierce đã đăng lại

Huge M365 news: “… powered by Azure Local, Microsoft 365 Local enables customers to deploy Microsoft productivity workloads like Exchange Server and SharePoint Server in their own datacenters or sovereign cloud environments…” Full announcement: blogs.microsoft.com/blog/2025/06/1…

rucam365's tweet image. Huge M365 news: “… powered by Azure Local, Microsoft 365 Local enables customers to deploy Microsoft productivity workloads like Exchange Server and SharePoint Server in their own datacenters or sovereign cloud environments…”

Full announcement: blogs.microsoft.com/blog/2025/06/1…

Sean Pierce đã đăng lại

Red Team Tactics: Advanced process monitoring techniques in offensive operations outflank.nl/blog/2020/03/1…

5mukx's tweet image. Red Team Tactics: Advanced process monitoring techniques in offensive operations

outflank.nl/blog/2020/03/1…
5mukx's tweet image. Red Team Tactics: Advanced process monitoring techniques in offensive operations

outflank.nl/blog/2020/03/1…

Sean Pierce đã đăng lại

Nothing to see here…just the CIA director destroying evidence and violating the federal records act.

JUST IN: CIA confirms that when it scanned Director Ratcliffe's phone for Signalgate messages, they were gone. s3.documentcloud.org/documents/2589…

kyledcheney's tweet image. JUST IN: CIA confirms that when it scanned Director Ratcliffe's phone for Signalgate messages, they were gone. 

s3.documentcloud.org/documents/2589…


Sean Pierce đã đăng lại

.@Microsoft reported that domain controllers were breached in more than 78% of human-operated cyberattacks, while the primary device used to spread #ransomware at scale was a domain controller in over 35% of cases. #cybersecurity #infosec #ITsecurity bit.ly/42sRjU6

scworld.com

Microsoft warns how domain controllers can be used to spread ransomware

Domain controllers were breached in more than 78% of human-operated cyberattacks, warned Microsoft.


Sean Pierce đã đăng lại

Figured this would be a fun weekend project... Claude Desktop + COM Automation 🤯 Outlook, Excel, Word, Shell - anything with a COM interface on Windows is now discoverable and scriptable using this MCP server that wraps COM. AI just got an upgrade. 🚀

wunderwuzzi23's tweet image. Figured this would be a fun weekend project... 

Claude Desktop + COM Automation 🤯

Outlook, Excel, Word, Shell - anything with a COM interface on Windows is now discoverable and scriptable using this MCP server that wraps COM. 

AI just got an upgrade. 🚀
wunderwuzzi23's tweet image. Figured this would be a fun weekend project... 

Claude Desktop + COM Automation 🤯

Outlook, Excel, Word, Shell - anything with a COM interface on Windows is now discoverable and scriptable using this MCP server that wraps COM. 

AI just got an upgrade. 🚀

Sean Pierce đã đăng lại

NomNom’s gone full beast mode! :-) I've now integrated Havoc C2 into NomNom, I'm very stoked. After execution, it injects shellcode into Notepad to run a Havoc Demon which connects back to the Teamserver. Malware Development is so fun

_m00ndie's tweet image. NomNom’s gone full beast mode! :-)
I've now integrated Havoc C2 into NomNom, I'm very stoked. After execution, it injects shellcode into Notepad to run a Havoc Demon which connects back to the Teamserver. Malware Development is so fun
_m00ndie's tweet image. NomNom’s gone full beast mode! :-)
I've now integrated Havoc C2 into NomNom, I'm very stoked. After execution, it injects shellcode into Notepad to run a Havoc Demon which connects back to the Teamserver. Malware Development is so fun

Sean Pierce đã đăng lại

A Hands-On Guide to Active Directory Enumeration and Modification with ldap3 mostafatoumi.github.io/posts/LDAP3_AD…

5mukx's tweet image. A Hands-On Guide to Active Directory Enumeration and Modification with ldap3

mostafatoumi.github.io/posts/LDAP3_AD…
5mukx's tweet image. A Hands-On Guide to Active Directory Enumeration and Modification with ldap3

mostafatoumi.github.io/posts/LDAP3_AD…

Sean Pierce đã đăng lại

Thread Execution Hijacking is one of the well-known methods that can be used to run implanted code. In this blog we introduce a new injection method, that is based on this classic technique, but much stealthier - Waiting Thread Hijacking. Read More : research.checkpoint.com/2025/waiting-t…


Sean Pierce đã đăng lại

I ported @trufflesec's trufflehog to a Chrome Extension using Chrome's Native Messaging feature to passively detect all secrets that go through my browser's network.

c3l3si4n's tweet image. I ported @trufflesec's trufflehog to a Chrome Extension using Chrome's Native Messaging feature to passively detect all secrets that go through my browser's network.
c3l3si4n's tweet image. I ported @trufflesec's trufflehog to a Chrome Extension using Chrome's Native Messaging feature to passively detect all secrets that go through my browser's network.

Sean Pierce đã đăng lại

Remove-Item $MyInvocation.MyCommand.Definition -Force When this command is run inside a PowerShell script, it will delete the script file itself after execution begins. The built-in cleanup task of a malicious PowerShell sample.

malmoeb's tweet image. Remove-Item $MyInvocation.MyCommand.Definition -Force

When this command is run inside a PowerShell script, it will delete the script file itself after execution begins. The built-in cleanup task of a malicious PowerShell sample.

Sean Pierce đã đăng lại

A Canadian man who had two rats as pets learned that letting them drive a miniature car reduced their levels of stress, so he gave them an electric miniature car and taught them to drive. [📹 emperorsofmischief]


Sean Pierce đã đăng lại

This is an absolutely wild one by @iangcarroll and @samwcyo The most basic SQL injection ever in the Known Crewmember (KCM) and Cockpit Access Security System (CASS) used by airlines and TSA. Literally ' OR 1=1 got them admin access. Here's what we know:


Sean Pierce đã đăng lại

Obscure languages? No, either the LLM can't translate, or both can. Fake languages? I tried Klingon, but only worked with a jailbreak a small portion of the time. Turns out, the answer was pig latin. It obfuscates your intent enough to bypass filters, but amazingly...


Sean Pierce đã đăng lại

The vx-underground malware families collection is temporarily available for bulk download. - 222GB (compressed) - 234GB (uncompressed) - 123,915 malware samples - 763 malware families - Password: infected For people who are unhappy with the download speed on…

vxunderground's tweet image. The vx-underground malware families collection is temporarily available for bulk download. 

- 222GB (compressed) 
- 234GB (uncompressed) 
- 123,915 malware samples 
- 763 malware families 
- Password: infected  

For people who are unhappy with the download speed on…

Sean Pierce đã đăng lại

Check out that view! Take in the scenery w/ our team on May 29. Join @_wald0, @JustinKohler10, @harmj0y & @tifkin_ at @AscendBellevue & get the latest on managing Attack Paths w/ BHE & our latest project Nemesis straight from the creators. Register 👉 ghst.ly/bhseattle

SpecterOps's tweet image. Check out that view! Take in the scenery w/ our team on May 29.

Join @_wald0, @JustinKohler10, @harmj0y & @tifkin_ at @AscendBellevue & get the latest on managing Attack Paths w/ BHE & our latest project Nemesis straight from the creators. 

Register 👉 ghst.ly/bhseattle

Sean Pierce đã đăng lại

CVE-2023-51572. Beautiful bug, so simple.

steventseeley's tweet image. CVE-2023-51572. Beautiful bug, so simple.

Sean Pierce đã đăng lại

Hot take: this image is a testament to the strength of current iOS security. If anyone is worried about their fully patched iPhone being hacked remotely, this shows some of the funding, research, and resources required to target you. The odds of you being worth it are pretty…

This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software: securelist.com/operation-tria…

sweis's tweet image. This iMessage exploit is crazy. TrueType vulnerability that has existed since the 90s, 2 kernel exploits, a browser exploit, and an undocumented hardware feature that was not used in shipped software:
securelist.com/operation-tria…


Loading...

Something went wrong.


Something went wrong.