#blueteam search results

KslKatzBOF A Beacon Object File (BOF) in-line LSASS credential extraction using the KslD.sys BYOVD technique github.com/PrincipleCheck… #redteam #pentesting #blueteam


UnderlayCopy_bof BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell github.com/Muz1K1zuM/Unde… #blueteam #redteam #dfir

co11ateral's tweet image. UnderlayCopy_bof

BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell

github.com/Muz1K1zuM/Unde…

#blueteam #redteam #dfir

An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag originhq.com/blog/securityt… #ThreatHunting #blueteam #redteam #pentesting

co11ateral's tweet image. An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag

originhq.com/blog/securityt…

#ThreatHunting #blueteam #redteam #pentesting

For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out. Here we cover evidence of execution hackers-arise.com/digital-forens… @three_cube @_aircorridor @DI0256 #forensics #cybersecurity #blueteam

co11ateral's tweet image. For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out.

Here we cover evidence of execution

hackers-arise.com/digital-forens…

@three_cube @_aircorridor @DI0256 
#forensics #cybersecurity #blueteam

Remote DLL Injection with Timer-based Shellcode Execution Using classic DLL injection with CreateThreadpoolTimer to run shellcode in-memory using legit system threads. A tool by Andrea Bocchetti (andreisss) Source: github.com/andreisss/Remo… #redteam #blueteam #maldev


These polls are a snapshot in time. Yes, as a Dem I find them encouraging, but I'll keep working working working to elect #BlueTeam Members.

🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%. Georgia - 2026 US Senate 🟦Jon Ossoff* 51% (+7) 🟥Mike Collins 44% Echelon Insights | April 3-9, 2026 | 407 LV

ElectionTime_'s tweet image. 🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%.

Georgia - 2026 US Senate
🟦Jon Ossoff* 51% (+7)
🟥Mike Collins 44%

Echelon Insights | April 3-9, 2026 | 407 LV


See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam #redteam #pentest

co11ateral's tweet image. See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams

hackers-arise.com/powershell-for…

@three_cube @_aircorridor 
#blueteam #redteam #pentest

SysWhispers4 AV/EDR evasion via direct and indirect system calls Windows NT 3.1 through Windows 11 24H2 /x64/x86/WoW64/ARM64 github.com/JoasASantos/Sy… #dfir #blueteam #redteam #pentesting


Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato! 👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo… G

MolloNoleggio's tweet image. Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato!
👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo…
G
MolloNoleggio's tweet image. Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato!
👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo…
G

An example of bypassing SmartScreen via email g3tsyst3m.com/initial%20acce… #apt #windows #blueteam

co11ateral's tweet image. An example of bypassing SmartScreen via email

g3tsyst3m.com/initial%20acce…

#apt #windows #blueteam

Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam

MikeLoerop's tweet image. Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam

We showed how the backdoor works and how to detect it in our article hackers-arise.com/compromising-t… #apt #blueteam

🚨 Rapid7 Labs has uncovered stealth “sleeper cell” access embedded in telecommunications networks by a China-nexus threat actor. Telecom networks are the central nervous system of the digital world. This type of compromise impacts everyone. IoCs & more: r-7.co/3NQ7szA

rapid7's tweet image. 🚨 Rapid7 Labs has uncovered stealth “sleeper cell” access embedded in telecommunications networks by a China-nexus threat actor.

Telecom networks are the central nervous system of the digital world. This type of compromise impacts everyone. IoCs & more: r-7.co/3NQ7szA


BypassAV list Map listing essential techniques to bypass anti-virus and EDR, in HTML and markdown format. A post by matro7ch habibi. Source: github.com/matro7sh/Bypas… #redteam #blueteam #maldev #malwaredevelopment


Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️ Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags one lab at a time. On to the next challenge 🚀 #CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it hackers-arise.com/compromising-t… @three_cube @_aircorridor #pentesting #redteam #blueteam #apt

co11ateral's tweet image. In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it

hackers-arise.com/compromising-t…

@three_cube @_aircorridor 
#pentesting #redteam #blueteam #apt

New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

L0rd5ud0's tweet image. New post: CVE-2025-15556 : the Notepad++ supply chain attack.
They never touched the code. Just the updater.
Full breakdown + IOCs + detection guide 
blog.lordsudo.com/posts/supplych…

#CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/3OjGIYJ #CyberSecurity #BlueTeam #DFIR #InfoSec

INEsecurity's tweet image. Not everyone chooses defense.

It’s a mindset:
• Staying curious
• Thinking ahead
• Seeing what others miss

For some, that’s where it starts.

Join the Defender Circle 👉 bit.ly/3OjGIYJ

#CyberSecurity #BlueTeam #DFIR #InfoSec

These polls are a snapshot in time. Yes, as a Dem I find them encouraging, but I'll keep working working working to elect #BlueTeam Members.

🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%. Georgia - 2026 US Senate 🟦Jon Ossoff* 51% (+7) 🟥Mike Collins 44% Echelon Insights | April 3-9, 2026 | 407 LV

ElectionTime_'s tweet image. 🚨SHOCK POLL: Jon Ossoff leads by a whopping 7% in the Georgia's US Senate election. He won his first term in 2021 by just 1.2%.

Georgia - 2026 US Senate
🟦Jon Ossoff* 51% (+7)
🟥Mike Collins 44%

Echelon Insights | April 3-9, 2026 | 407 LV


Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️ Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags one lab at a time. On to the next challenge 🚀 #CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec
Dr_SevenLabs's tweet image. Phishing emails tried it… I analyzed it 🕵️‍♂️🛡️
Just completed a hands-on Phishing Analysis challenge. Diving into email headers, tracing delivery details, and spotting red flags
one lab at a time. On to the next challenge 🚀
#CyberSecurity #SOCAnalyst #BlueTeam #Phishing #InfoSec

Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato! 👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo… G

MolloNoleggio's tweet image. Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato!
👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo…
G
MolloNoleggio's tweet image. Unisciti anche tu al #BLUETEAM! Entra a far parte di un grande gruppo, dinamico, familiare e stimolante in cui crescere insieme ad un team affiatato!
👉 Chiamaci al numero 0173.445696 o consulta le posizioni aperte su mollofratelli.com/lavorare-in-mo…
G

New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

L0rd5ud0's tweet image. New post: CVE-2025-15556 : the Notepad++ supply chain attack.
They never touched the code. Just the updater.
Full breakdown + IOCs + detection guide 
blog.lordsudo.com/posts/supplych…

#CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

💡 LESSON LEARNED (7/7) You don’t need a job to get experience. Build the lab. Break things. Document everything. This is how you go from Political Science grad → SOC analyst. RT if this helps someone 🙌 #CyberSecurity #SOC #BlueTeam #Wazuh #SIEM #InfoSec #MITREATTaCK #HomeLab


Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/4vzH7Hc #CyberSecurity #BlueTeam #DFIR #InfoSec

ine's tweet image. Not everyone chooses defense.

It’s a mindset:
• Staying curious
• Thinking ahead
• Seeing what others miss

For some, that’s where it starts.

Join the Defender Circle 👉 bit.ly/4vzH7Hc

#CyberSecurity #BlueTeam #DFIR #InfoSec

Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/41E3MEw #CyberSecurity #BlueTeam #DFIR #InfoSec

SecurityTube's tweet image. Not everyone chooses defense.

It’s a mindset:
• Staying curious
• Thinking ahead
• Seeing what others miss

For some, that’s where it starts.

Join the Defender Circle 👉 bit.ly/41E3MEw

#CyberSecurity #BlueTeam #DFIR #InfoSec

Not everyone chooses defense. It’s a mindset: • Staying curious • Thinking ahead • Seeing what others miss For some, that’s where it starts. Join the Defender Circle 👉 bit.ly/3OjGIYJ #CyberSecurity #BlueTeam #DFIR #InfoSec

INEsecurity's tweet image. Not everyone chooses defense.

It’s a mindset:
• Staying curious
• Thinking ahead
• Seeing what others miss

For some, that’s where it starts.

Join the Defender Circle 👉 bit.ly/3OjGIYJ

#CyberSecurity #BlueTeam #DFIR #InfoSec

Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam

MikeLoerop's tweet image. Most social engineering attacks don’t hack systems, they hack urgency. While studying cybersecurity labs, I noticed attackers rely on rushed decisions more than technical flaws. Simple check: slow down and verify requests out of band. #cybersecurity #BlueTeam

🚀 Day 22/30 (#M4ACE): Learned about SOC and Blue Team roles—monitoring, detecting, and responding to threats. Understanding how defenders protect systems is shaping my interest in becoming a cybersecurity analyst 🔐💻 #Cybersecurity #BlueTeam #M4ACE



Did you know there's a FREE 16-week hands-on Blue Team course on YouTube? Build a portfolio with SOC labs, detection rules, and incident response simulations. Perfect for aspiring SOC analysts or detection engineers! Are you ready to enhance your skills? 💻 #BlueTeam


ThreatIntelChecker: a cross-platform Python and PowerShell tool that checks IPs, domains, URLs, and SHA256 hashes across multiple threat intelligence sources. github.com/eddietorial/Th… #SOC #ThreatIntelligence #BlueTeam #SIEM #Splunk #Python #PowerShell #CyberSecurity


Blue Team ready to roll ⚾🔥 Middle School Baseball hits the field TONIGHT at 6:30PM 📍 Ocoee Pull up and cheer them on—let’s get it! 💪 #Baseball #GameNight #BlueTeam #LetsGo

faathletic's tweet image. Blue Team ready to roll ⚾🔥

Middle School Baseball hits the field TONIGHT at 6:30PM
📍 Ocoee

Pull up and cheer them on—let’s get it! 💪

#Baseball #GameNight #BlueTeam #LetsGo

UNISCITI ANCHE TU AL #BLUETEAM! CERCHIAMO UN IMPIEGATO/A AMMINISTRATIVO/A DA INSERIRE ALL'INTERNO DELLA NOSTRA FILIALE DI VENEZIA. 👉Vuoi maggiori informazioni? Chiamaci al numero 0173.445696 👉 mollofratelli.com/lavorare-in-mo… GRUPPO MOLLO: INSIEME E’ TUTTA UN’ALTRA COSA!

MolloNoleggio's tweet image. UNISCITI ANCHE TU AL #BLUETEAM! CERCHIAMO UN IMPIEGATO/A AMMINISTRATIVO/A DA INSERIRE ALL'INTERNO DELLA NOSTRA FILIALE DI VENEZIA.
👉Vuoi maggiori informazioni? Chiamaci al numero 0173.445696
👉 mollofratelli.com/lavorare-in-mo…
GRUPPO MOLLO: INSIEME E’ TUTTA UN’ALTRA COSA!
MolloNoleggio's tweet image. UNISCITI ANCHE TU AL #BLUETEAM! CERCHIAMO UN IMPIEGATO/A AMMINISTRATIVO/A DA INSERIRE ALL'INTERNO DELLA NOSTRA FILIALE DI VENEZIA.
👉Vuoi maggiori informazioni? Chiamaci al numero 0173.445696
👉 mollofratelli.com/lavorare-in-mo…
GRUPPO MOLLO: INSIEME E’ TUTTA UN’ALTRA COSA!

You thought I quit? Jokes on you. Day 27–30 of becoming a SOC Analyst Finished networking basics and moved on to building a roadmap for my SOC journey. Studied SOC fundamentals, the pillars of a SOC analyst, and the 5 W’s of the alert triangle. Hands-on labs completed.” #BlueTeam

DavidEtim2654's tweet image. You thought I quit? Jokes on you.
Day 27–30 of becoming a SOC Analyst
Finished networking basics and moved on to building a roadmap for my SOC journey.
Studied SOC fundamentals, the pillars of a SOC analyst, and the 5 W’s of the alert triangle.
Hands-on labs completed.”
#BlueTeam

Most attacks don’t “hack” passwords, they bypass them. While studying MFA, I noticed attackers target the human step, not the tech. MFA adds a second proof of identity. Tip: avoid push fatigue, use authenticator apps over SMS. #cybersecurity #BlueTeam

MikeLoerop's tweet image. Most attacks don’t “hack” passwords, they bypass them. While studying MFA, I noticed attackers target the human step, not the tech. MFA adds a second proof of identity. Tip: avoid push fatigue, use authenticator apps over SMS. #cybersecurity #BlueTeam

How to protect yourself: Use a password manager Enable Multi-Factor Authentication (MFA) everywhere possible Use strong, unique passwords for every account Avoid password reuse at all costs #Cybersecurity #BlueTeam #IAM


New post: CVE-2025-15556 : the Notepad++ supply chain attack. They never touched the code. Just the updater. Full breakdown + IOCs + detection guide blog.lordsudo.com/posts/supplych… #CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

L0rd5ud0's tweet image. New post: CVE-2025-15556 : the Notepad++ supply chain attack.
They never touched the code. Just the updater.
Full breakdown + IOCs + detection guide 
blog.lordsudo.com/posts/supplych…

#CyberSecurity #ThreatIntel #BlueTeam #SupplyChain

UnderlayCopy_bof BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell github.com/Muz1K1zuM/Unde… #blueteam #redteam #dfir

co11ateral's tweet image. UnderlayCopy_bof

BOF for Havoc that copies locked Windows files (SAM, SYSTEM, NTDS.dit) via raw MFT parsing. No VSS, no Registry APIs, no PowerShell

github.com/Muz1K1zuM/Unde…

#blueteam #redteam #dfir

For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out. Here we cover evidence of execution hackers-arise.com/digital-forens… @three_cube @_aircorridor @DI0256 #forensics #cybersecurity #blueteam

co11ateral's tweet image. For those of you interested in digital forensics, Part 3 of our Registry Forensics series is now out.

Here we cover evidence of execution

hackers-arise.com/digital-forens…

@three_cube @_aircorridor @DI0256 
#forensics #cybersecurity #blueteam

Your attacker already knows your gaps. Do you? 🛡️ @SecHubb, @secgreene, David Hoelzer & 15+ SANS experts. April 30th — a full day of real tactics, real tools, no filler. Secure Your Fortress → go.sans.org/X9vR6R #CyberDefense #BlueTeam

SANSInstitute's tweet image. Your attacker already knows your gaps. Do you? 🛡️

@SecHubb, @secgreene, David Hoelzer & 15+ SANS experts. April 30th — a full day of real tactics, real tools, no filler.

Secure Your Fortress → go.sans.org/X9vR6R

#CyberDefense #BlueTeam

See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam #redteam #pentest

co11ateral's tweet image. See how legitimate Windows executables can be abused for reconnaissance, data exfiltration and persistence during pentests. Useful for both red and blue teams

hackers-arise.com/powershell-for…

@three_cube @_aircorridor 
#blueteam #redteam #pentest

Flying Under the Radar with Powershell A new article on Living off the Land binaries has been published. Especially helpful for those just getting started hackers-arise.com/powershell-for… @three_cube @_aircorridor @DI0256 @IamSmouk #redteam #blueteam #powershell #pentesting

co11ateral's tweet image. Flying Under the Radar with Powershell

A new article on Living off the Land binaries has been published. Especially helpful for those just getting started

hackers-arise.com/powershell-for…

@three_cube @_aircorridor @DI0256 @IamSmouk 
#redteam #blueteam #powershell #pentesting

Cuma 18.00, status check ✅ #SOC #BlueTeam #SiberGüvenlik

onuroktay's tweet image. Cuma 18.00, status check ✅

#SOC #BlueTeam #SiberGüvenlik

SynthAPT A framework for building payloads with some interesting AI-driven features. For example, it includes a Python in-memory interpreter and supports BOFs github.com/acedef/SynthAP… #threatintel #blueteam #redteam

co11ateral's tweet image. SynthAPT 

A framework for building payloads with some interesting AI-driven features. For example, it includes a Python in-memory interpreter and supports BOFs

github.com/acedef/SynthAP…

#threatintel #blueteam #redteam

In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it hackers-arise.com/compromising-t… @three_cube @_aircorridor #pentesting #redteam #blueteam #apt

co11ateral's tweet image. In light of recent investigations into BPFDoor, a backdoor reportedly installed by Chinese actors in telecom systems, we wrote an article showing how it works and how you can detect it

hackers-arise.com/compromising-t…

@three_cube @_aircorridor 
#pentesting #redteam #blueteam #apt

An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag originhq.com/blog/securityt… #ThreatHunting #blueteam #redteam #pentesting

co11ateral's tweet image. An interesting piece of research on stopping arbitrary ETW traces using an undocumented “Stop Trace” flag

originhq.com/blog/securityt…

#ThreatHunting #blueteam #redteam #pentesting

Making forensic CSV data easier and actually useful to analyze with Forensic Timeliner. Works well with files generated by KAPE, Chainsaw, Axiom, NirSoft, and Hayabusa hackers-arise.com/digital-forens… @three_cube @_aircorridor #dfir #forensics #blueteam

co11ateral's tweet image. Making forensic CSV data easier and actually useful to analyze with Forensic Timeliner.

Works well with files generated by KAPE, Chainsaw, Axiom, NirSoft, and Hayabusa

hackers-arise.com/digital-forens…

@three_cube @_aircorridor 
#dfir #forensics #blueteam

Defenders, these two scripts will help with endpoint and ACL security 1. Audit.ps1 2. ADACLScanner.ps1 Learn how: hackers-arise.com/powershell-for… @three_cube @_aircorridor #blueteam

co11ateral's tweet image. Defenders, these two scripts will help with endpoint and ACL security

1. Audit.ps1 
2. ADACLScanner.ps1

Learn how: hackers-arise.com/powershell-for…

@three_cube @_aircorridor #blueteam

Elastic EDR Bypass An example of bypassing Elastic EDR that allows to execute your own malware on an endpoint systemweakness.com/lateral-moveme… #threatintel #blueteam #redteam

co11ateral's tweet image. Elastic EDR Bypass

An example of bypassing Elastic EDR that allows to execute your own malware on an endpoint

systemweakness.com/lateral-moveme…

#threatintel #blueteam #redteam

A tool for enumerating SharePoint via Microsoft Graph. It recursively downloads files and logs every HTTP request for correlation with SIEM and development of detection rules github.com/zh54321/ShareP… #blueteam #redteam #pentesting #windows

co11ateral's tweet image. A tool for enumerating SharePoint via Microsoft Graph. It recursively downloads files and logs every HTTP request for correlation with SIEM and development of detection rules

github.com/zh54321/ShareP…

#blueteam #redteam #pentesting #windows

Staring at’ nano /var/ossec/etc/ossec.conf’ for way too long. It’s wild how one tiny character or a missing / in the XML header can break an entire Wazuh agent. It’s frustrating as hell, Still fighting the config, but I’m not logging off until it’s right #SOC #Wazuh #BlueTeam

mr_kay7's tweet image. Staring at’ nano /var/ossec/etc/ossec.conf’ for way too long. 
It’s wild how one tiny character or a missing / in the XML header can break an entire Wazuh agent. It’s frustrating as hell, Still fighting the config, but I’m not logging off until it’s right
 #SOC #Wazuh #BlueTeam

An example of bypassing SmartScreen via email g3tsyst3m.com/initial%20acce… #apt #windows #blueteam

co11ateral's tweet image. An example of bypassing SmartScreen via email

g3tsyst3m.com/initial%20acce…

#apt #windows #blueteam

PrivHound An extension for #BloodHound designed to identify local privilege escalation (LPE) vectors github.com/dazzyddos/Priv… #blueteam #redteam #pentesting

co11ateral's tweet image. PrivHound

An extension for #BloodHound designed to identify local privilege escalation (LPE) vectors

github.com/dazzyddos/Priv…

#blueteam #redteam #pentesting

❌ Klasik SOC Bitti. ✅ AI SOC Dönemi Başladı. #BlueTeam #SOC #CyberSecurity #SOCNova

onuroktay's tweet image. ❌ Klasik SOC Bitti. ✅ AI SOC Dönemi Başladı.

#BlueTeam #SOC #CyberSecurity #SOCNova

Bypassing Detections with Command-Line Obfuscation wietzebeukema.nl/blog/bypassing… #blueteam #redteam #pentesting

co11ateral's tweet image. Bypassing Detections with Command-Line Obfuscation

wietzebeukema.nl/blog/bypassing…

#blueteam #redteam #pentesting

Loading...

Something went wrong.


Something went wrong.