A. Hacker

@armitagehacker

Developer of Cobalt Strike [for red team ops & adversary simulations]; Founder . Always on Twitter hiatus. Email raffi@strategiccyber.com

Washington, DC
Joined November 2010

Tweets

You blocked @armitagehacker

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @armitagehacker

  1. Pinned Tweet
    30 Sep 2015
  2. Retweeted
    Dec 8

    Almost done with the ExternalC2 build tool and aggressor script. It uses the Roslyn compiler so the ExternalC2 connectors can be built across all platforms. The compiled assembly is wrapped with DotNetToJScript, hosted, and then web delivery commands are generated.

  3. Dec 11
  4. Retweeted
    Dec 9

    some cover arts from the article: Deathstar from Armitage from Bloodhound from

    Show this thread
  5. Retweeted
    Dec 5

    Check out the new post from our on building covert red team attack infrastructures

  6. Retweeted
    Nov 16

    Sincerest thank you and kudos to the for their Adversary Powershell course. Easily one of the most difficult, rewarding, and inspiring courses I've taken in my career. Defenders would be remiss not to take any training offered by them.

  7. Retweeted
    Nov 13

    Happy to welcome Roberto Rodriguez () to our Adversary Detection team! Check out some of his GitHub and blog !

  8. Retweeted
    Nov 15

    The community is growing. We have nearly 900 people in the official BloodHound gang slack, with several channels discussing topics like PowerView, CrackMapExec, Cobalt Strike, Defense, and more. Join us at

  9. Retweeted
    Nov 14

    I published my ExternalC2 library last night: Right now it has 3 C2 connectors: a simple Web API, WebSockets, and a direct socket. The library includes unit tests and plenty of code comments. I suggest running the tests to understand the implementations.

    Show this thread
  10. Retweeted
    Nov 7

    Excited to finally release csfm.cna with !!! This is the major update to RedTeamRepo.cna.

  11. Retweeted
    Nov 5

    My course review of Adv Tactics Red Team Ops course. Easily the best tech course ever!

  12. Retweeted
    Nov 2

    In Win 10 RS3, MSFT introduced a new abusable binary. "Bypassing Application Whitelisting with runscripthelper.exe"

    Show this thread
  13. Nov 1

    Added several new notes and references to 2015's Advanced Threat Tactics course page.

  14. Retweeted
    Nov 1

    SpecterOps is Proud to Announce Acquisition of . More info at:

  15. Retweeted
    Oct 30

    So excited - here's my updated "Guide to Attacking Domain Trusts" ! Was a blast to write

  16. Retweeted
    Oct 31

    Found in the Sleep language manual, but I don't think it's working.. I opened SSH to the internet. Do I need anything else ?

  17. Oct 25
  18. Oct 24
  19. Retweeted
    Oct 17

    Adversary Tactics:PowerShell class delivered in Bellevue, WA on Nov 13-16th with and . Link:

  20. Retweeted
    Oct 19

    With another CVE under his belt, demonstrates another constrained language mode bypass.

  21. Retweeted
    Oct 11

    With all this DDE attention, remember you can use it in Excel SLK files and not have to worry about protected view:

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·