
Antonio Cocomazzi
@splinter_code
offensive security - windows internals | BlueSky: http://bsky.app/profile/splintercode.bsky.social | Mastodon: http://infosec.exchange/@splinter_code
你可能會喜歡
The slides of our joint research talk “10 Years of Windows Privilege Escalation with Potatoes” at #POC2023 are out! 👉 github.com/antonioCoco/in… cc @decoder_it

Better socket handle visibility coming soon to @SystemInformer 🔥 When viewing a process handle table, SI will recognize files under \Device\Afd and retrieve information about their state, protocol, addresses, and more. Also works on Bluetooth and Hyper-V sockets 🤩

In my long history of submissions, I think this is the first time one has been marked as critical😅

Another Monday. Another week of… endless emails, annoying meetings, and oh look, a three-headed monkey behind you! Now that we have your attention, we can unveil the agenda for #RomHack2025 romhack.io/romhack-confer… #infosec #securityconference

I just published a blog post where I try to explain and demystify Kerberos relay attacks. I hope it’s a good and comprehensive starting point for anyone looking to learn more about this topic. ➡️decoder.cloud/2025/04/24/fro…
decoder.cloud
From NTLM relay to Kerberos relay: Everything you need to know
While I was reading Elad Shamir recent excellent post about NTLM relay attacks, I decided to contribute a companion piece that dives into the mechanics of Kerberos relays, offering an analysis and …
Microsoft has discovered post-compromise exploitation of CVE 2025-29824, a zero-day elevation of privilege vulnerability in Windows Common Log File System (CLFS), against a small number of targets. msft.it/6019qIVV9
NTLM relay is still a major threat and is now even easier to abuse. We just added new NTLM relay edges to BloodHound to help defenders fix and attackers think in graphs. Read my detailed post - the most comprehensive guide on NTLM relay & the new edges: ghst.ly/4lv3E31
specterops.io
The Renaissance of NTLM Relay Attacks: Everything You Need to Know - SpecterOps
NTLM relay attacks have been around for a long time. While many security practitioners think NTLM relay is a solved problem, or at least a not-so-severe one, it is, in fact, alive and kicking and...
We (me + @2igosha) have discovered a new Google Chrome 0-day that is being used in targeted attacks to deliver sophisticated spyware 🔥🔥🔥. It was just fixed as CVE-2025-2783 and we are revealing the first details about it and “Operation ForumTroll” securelist.com/operation-foru…
Check out our new blog post!
🍎🚨🕵️♂️ The notoriously elusive macOS malware, ReaderUpdate, is back — stealthier than ever. @philofishal and @syrion89 uncover how ReaderUpdate Reforged blends Go, Crystal, Nim, and Rust into a potent mix. 📄 This new research from SentinelOne exposes how these new variants are…

new #elastic defend rules out : - PPL bypass via ComDotNetExploit - Execution via Windows-Run (trending delivery method ITW) github.com/elastic/protec…


Hey, we should really switch from NTLM to something like Kerberos, yet another good reason, right? cc @ShitSecure @splinter_code 😂🤣

KrbRelayEx-RPC tool is out! 🎉 Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;) github.com/decoder-it/Krb…

Great work! few detection points: - registry change "HKLM\\SOFTWARE\\Classes\\CLSID\\{0BE35203-8F91-11CE-9DE3-00AA004BB851}\\TreatAs\\" - WaaSMedicSvc loading CLR (result of .NET execution in the context) - Impersonation as Trusted Installer.


🚀 New Blog & PoC: Abusing IDispatch for COM Object Access & PPL Injection Leveraging STDFONT via IDispatch to inject into PPL processes & access LSASS. Inspired by James Forshaw's research! 🔍 Blog: mohamed-fakroud.gitbook.io/red-teamings-d… 💻 Code: github.com/T3nb3w/ComDotN…
Another simple standalone tool for creating machine accounts with custom password in Windows AD github.com/decoder-it/New…
github.com
GitHub - decoder-it/NewMachineAccount
Contribute to decoder-it/NewMachineAccount development by creating an account on GitHub.
This tweet was mentioned in the BlackBasta Leak bestflowers.json ( timestamp: 2023-10-23 16:17:02 )
🚀 #RomHack 2025 #callforpapers is OPEN! Are you a #cybersecurity pro with a passion for sharing knowledge? This is your chance to take the stage at #RomHack2025 📩 Apply now: cfp.romhack.io/romhack-2025/c… #InfoSec #hackercommunity
United States 趨勢
- 1. #JoyForum N/A
- 2. #2025MAMAVOTE 101K posts
- 3. Good Thursday 16.5K posts
- 4. #MC필릭스의_냉터뷰 9,071 posts
- 5. MC FELIX FRIDGE INTERVIEW 9,744 posts
- 6. #FridgeInterview_MCFelix 9,430 posts
- 7. Deport Harry Sisson 11K posts
- 8. Brevis ZK 137K posts
- 9. Mila 17.8K posts
- 10. Ninja Gaiden 8,713 posts
- 11. DuPont 1,997 posts
- 12. Deloitte 8,257 posts
- 13. #PokemonZA 2,389 posts
- 14. BNB Chain 21.4K posts
- 15. Pelosi 143K posts
- 16. Angel Reese 55.3K posts
- 17. Gabe Vincent 4,351 posts
- 18. Domain For Sale 19.5K posts
- 19. tzuyu 265K posts
- 20. Mad Max 4,199 posts
你可能會喜歡
-
x86matthew
@x86matthew -
S3cur3Th1sSh1t
@ShitSecure -
Andrea P
@decoder_it -
mpgn
@mpgn_x64 -
Chetan Nayak (Brute Ratel C4 Author)
@NinjaParanoid -
MDSec
@MDSecLabs -
Matt Hand
@matterpreter -
an0n
@an0n_r0 -
Lee Chagolla-Christensen
@tifkin_ -
klez
@KlezVirus -
Melvin langvik
@Flangvik -
Swissky
@pentest_swissky -
Grzegorz Tworek
@0gtweet -
mgeeky | Mariusz Banach
@mariuszbit -
Adam Chester 🏴☠️
@_xpn_
Something went wrong.
Something went wrong.