Cn33liz

@Cneelis

Red teamer @ Outflank. Passionate about networking and cybersecurity | father of two superheroes.

Vrijeme pridruživanja: prosinac 2010.

Tweetovi

Blokirali ste korisnika/cu @Cneelis

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Cneelis

  1. Prikvačeni tweet
    20. lis 2019.

    New blog and Recon-AD tool: Active Directory Recon using ADSI and Reflective DLLs

    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    We have just pushed some *big* updates to Ghostwriter's master branch that I think you'll like. We've got WYSIWIG editors, autocomplete, new reports, and more! Check it out:

    Poništi
  4. proslijedio/la je Tweet
    29. sij

    New training dates for our public DAMTA training! Date: April 14-15-16 Location: Amsterdam Stroopwafels guaranteed! More info and registration via

    Poništi
  5. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  6. proslijedio/la je Tweet
    25. sij

    Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy!

    Poništi
  7. proslijedio/la je Tweet
    24. sij

    modexp is one of my fav. researchers; while I often skim on details he is killing it with posts that combine an extensive and comprehensive research on interesting and often nuanced topics and a very well written narrative top quality right there

    Poništi
  8. proslijedio/la je Tweet
    23. sij

    v2 is out 🔥 🔸Dump credentials on multiple hosts 🔸New dumping method using () thanks to 🤗 🔸Can be used as a in other python project 🔸Fully documented wiki ! Needs some testing, open issues if need be 🙃

    Poništi
  9. 23. sij

    Yes, tickets in the pocket 😁

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  11. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi
  12. proslijedio/la je Tweet
    20. sij

    It's here!!! Tell your colleagues, tell your friends, tell your grandma.

    Prikaži ovu nit
    Poništi
  13. proslijedio/la je Tweet
    8. sij

    I really enjoyed the talk from about anti-cheats, executing ring 0 code through GIGABYTE driver vulnerability: Unveiling the Underground World of Anti-Cheats

    Poništi
  14. proslijedio/la je Tweet
    18. sij

    If anybody needs help with this here are some good GPOs to get started.

    Poništi
  15. 18. sij

    Thank you

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    16. sij 2019.

    Collection of (undocumented) Microsoft Windows kernel structures for various Windows versions

    Poništi
  17. 18. sij

    Okay here it is, Zipper a new file and folder compression utility for CobaltStrike. Blue Teams/Hunters/Defenders: Lookout for non file-compression related processes creating (random named) zipfiles within temp folders.

    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    18. sij

    Windows kernel explorer: A free powerful Windows kernel research tool

    Poništi
  19. proslijedio/la je Tweet
    18. sij

    ": a Stealthy Lateral Movement Strategy" is now available to read Read if interested to see a new practical lateral movement Demo (TDS (MS SQL) & FTP): Prototype will be released soon

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    17. sij

    My blog post about CVE-2020-0601 is online! I hope you guys enjoy it, I didn't sleep for 2 days now, pardon me if I made some mistakes :) Feel free to point out any mistakes!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    16. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·