turbo_sec's profile picture. professional threat actor cosplayer

turbo

@turbo_sec

professional threat actor cosplayer

turbo 已轉發

We came, we stormed, we CONQUERED.🙌

MiamiHurricanes's tweet image. We came, we stormed, we CONQUERED.🙌

Off to San Diego for offensive ai con


turbo 已轉發

Keep thinking.


turbo 已轉發

#MiamiHerbert earned its highest placements to date in @usnews's 2026 rankings! Read more: news.miami.edu/miamiherbert/s…

MiamiHerbert's tweet image. #MiamiHerbert earned its highest placements to date in @usnews's 2026 rankings!

Read more: news.miami.edu/miamiherbert/s…

turbo 已轉發

App-Bound Encryption isn't stopping hungry attackers from getting into the cookie jar. 🍪 Join Andrew Gomez & Antero Guy at #BSidesDenver Sept 12 to learn how threat actors are still stealing browser secrets, plus a sweet EntraID cloud pivot bonus. ➡️ ghst.ly/45Bguqx

SpecterOps's tweet image. App-Bound Encryption isn't stopping hungry attackers from getting into the cookie jar. 🍪

Join Andrew Gomez & Antero Guy at #BSidesDenver Sept 12 to learn how threat actors are still stealing browser secrets, plus a sweet EntraID cloud pivot bonus.

➡️ ghst.ly/45Bguqx

turbo 已轉發

I Just documented a cool way to authenticate proxied tooling to LDAP in an AD environment using C2 payload auth context, without stealing any tickets or hashes! Keep tooling execution off-host and away from EDR on your Red Team assessments! specterops.io/blog/2025/08/2…


turbo 已轉發

Trying to fly under EDR's radar? @_logangoins explains how to use HTTP-to-LDAP relay attacks to execute tooling completely off-host through the C2 payload context. Perfect for when you need LDAP access but want to avoid being caught stealing creds. ghst.ly/41mjMv7


turbo 已轉發

New blog post just dropped! West Shepherd breaks down extending the Mythic Poseidon agent for ARM64 Dylib injection on Apple Silicon. Details include: ✅ Shellcode construction ✅ Memory allocation ✅ Runtime patching ✅ Thread creation Read more ⤵️ ghst.ly/41Nu4ED


turbo 已轉發

Manual recon commands eating up your time? 🕐 @atomiczsec breaks down how Mythic Eventing automates those repetitive reconnaissance tasks during RTOs, complete with starter YAML scripts you can customize. ghst.ly/45jwYDr


turbo 已轉發

🐺 It's time to unleash the hounds! @HugovdToorn & @joeydreijer are bringing BloodHound wizardry to Red Team Village at #DEFCON33. No shells to pop, no buffers to overflow; just a full-blown digital treasure hunt. Learn more: redteamvillage.io/defcon-33

SpecterOps's tweet image. 🐺 It's time to unleash the hounds! @HugovdToorn & @joeydreijer are bringing BloodHound wizardry to Red Team Village at #DEFCON33. No shells to pop, no buffers to overflow; just a full-blown digital treasure hunt.

Learn more: redteamvillage.io/defcon-33

turbo 已轉發

⏰ 1 HOUR TO GO 🚨 Next Code Drop hits today at 4PM EDT! Don’t miss your chance to grab a ticket to the Red Team Village party at AREA15. Make sure you're following @redteamvillage_ — tickets go quick.


turbo 已轉發

MSSQLHound leverages BloodHound's OpenGraph to visualize MSSQL attack paths with 7 new nodes & 37 new edges, all without touching the SharpHound & BloodHound codebases. @_Mayyhem unpacks this new feature in his blog post. 👇 ghst.ly/4leRFFn


turbo 已轉發

In this blog post I explain the fundamental building blocks, vocabulary, and principles of attack graph design for BloodHound: specterops.io/blog/2025/08/0…


turbo 已轉發

🎯 Mythic, Ghostwriter, Nemesis, and Tying the Room Together – @th3d00rman shows how these tools streamline red team ops, automate data analysis, and make reporting less painful. Modern workflows that really “tie the room together” at @redteamvillage_ during @defcon 33! 🎳

RedTeamVillage_'s tweet image. 🎯 Mythic, Ghostwriter, Nemesis, and Tying the Room Together – @th3d00rman shows how these tools streamline red team ops, automate data analysis, and make reporting less painful. Modern workflows that really “tie the room together” at @redteamvillage_ during @defcon 33! 🎳

turbo 已轉發

Entra Connect sync accounts can be exploited to hijack device userCertificate properties, enabling device impersonation and conditional access bypass. @hotnops explores cross-domain compromise tradecraft within the same tenant. Read more ⤵️ ghst.ly/3ISMGN9


turbo 已轉發

BloodHound v8.0 is here! 🎉 This update introduces BloodHound OpenGraph, revolutionizing Identity Attack Path Management by exposing attack paths throughout your entire tech stack, not just AD/Entra ID. Read more from @JustinKohler10: ghst.ly/bloodhoundv8 🧵: 1/7


turbo 已轉發

.@_logangoins is dropping knowledge on ADWS exploitation. 🧠 Learn how attackers use the SOAP protocol for LDAP collection on Domain Controllers & dive into maximizing OPSEC-considerate collection workflows while exploring detection methods. ghst.ly/4lPodH4


turbo 已轉發

Tried to write a short post on on MCP servers, how they can be vulnerable and some offensive cool MCP servers out there. medium.com/p/1ac7ffe82fb6 @RedSeerSecurity


turbo 已轉發

🔴 Red and blue teams, this one's for you. 🔵 LudusHound bridges BloodHound Attack Paths with lab automation by creating a functional Active Directory replica testing environment. Read @bagelByt3s blog post for more. ghst.ly/40Ippn1


Loading...

Something went wrong.


Something went wrong.