SPARTaN

@001SPARTaN

Operator . Speedskater, hacker. 99% caffeine. Tweets are mine, don't blame my employer. He/him.

NT AUTHORITY\SYSTEM@SEATTLE
Vrijeme pridruživanja: travanj 2009.

Tweetovi

Blokirali ste korisnika/cu @001SPARTaN

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @001SPARTaN

  1. proslijedio/la je Tweet
    prije 18 sati

    If you use the cs2modrewrite project to build your C2 redirector rules, it is now updated to support CS <=4.0 profiles (multi-variants).

    Poništi
  2. proslijedio/la je Tweet
    4. velj
    Poništi
  3. 4. velj

    As an infosec person who travels a lot (almost 150K miles last year!), this post has some great advice for those of you who haven't done as much flying.

    Poništi
  4. proslijedio/la je Tweet
    30. sij
    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij

    For the past few months, I've been diving into Apple's Endpoint Security Framework. This post shares how I use the framework for detection engineering purposes.

    Prikaži ovu nit
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    In his post, "Detection Engineering using Apple’s Endpoint Security Framework," illustrates how you can use ESF to detect In-Memory Execution on endpoints. Check it out:

    Poništi
  7. proslijedio/la je Tweet
    29. sij

    I made a goose that destroys your computer Download it free here:

    Prikaži ovu nit
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    New Blog Post from on Azure. Ryan discusses Azure and Azure AD's components, reviews some of the attacks, and release PowerZure to help understand the attacks. Link: PowerZure:

    Poništi
  9. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  10. proslijedio/la je Tweet
    28. sij

    SpecterOps is bringing its Adversary Tactics: Red Team Operations course to Denver, CO. on April 14th - 17th, 2020. Sign-up here:

    Poništi
  11. 27. sij

    This has been a long time in the making. Great work from in making a solid toolkit to improve Cobalt Strike lateral movement and persistence capabilities.

    Poništi
  12. proslijedio/la je Tweet
    22. sij

    New from - Revisiting Remote Desktop Lateral Movement This post discusses RDP lateral movement by leveraging mstscax.dll. Steven also is releasing SharpRDP with corresponding detection guidance for this attack technique. Post:

    Poništi
  13. proslijedio/la je Tweet
    22. sij

    Here is the link to the SpecterOps Adversary Tactics: PowerShell course material: Enjoy! For information about our current training offerings, information can be found here: (4/4)

    Prikaži ovu nit
    Poništi
  14. proslijedio/la je Tweet
    22. sij

    While still utilized at SpecterOps, our efforts have diversified far beyond just PowerShell. As a result, we made the decision to retire our PowerShell course. In the interest of transparency and supporting the community, we'd like to offer it up to the community for free. (3/4)

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    22. sij

    This is why SpecterOps developed our Adversary Tactics: PowerShell course; to equip red teamers and defenders with the skills necessary to operate in this heavily scrutinized environment. (2/4)

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    22. sij

    Despite its incredible security enhancements, PowerShell continues to be abused by adversaries. A strong knowledge of PowerShell enables defenders to effectively manage and respond to its abuse. (1/4)

    Prikaži ovu nit
    Poništi
  17. proslijedio/la je Tweet
    21. sij

    Just released Satellite, a payload hosting and proxy software for red team operations. In the blog post, I discuss the feature set of Satellite as well as why an operator would choose it over Apache or Nginx.

    Prikaži ovu nit
    Poništi
  18. 16. sij

    I had a two hour international connection with a terminal transfer at LHR. Now my flight to London is delayed. This could get interesting...

    Poništi
  19. proslijedio/la je Tweet
    14. sij

    A great post that demonstrates an example of how to create a custom Task in Covenant that requires 3rd-party dependencies, a question that has come up frequently. Great work ! 👏🍻

    Poništi
  20. proslijedio/la je Tweet
    13. sij

    In this post, dissects Mimikat'z kernel mode driver, Mimidrv, and walks through some of the capabilities available to us in ring 0. Check it out:

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·