A. Hacker

@armitagehacker

Developer of Cobalt Strike [for red team ops & adversary simulations]; Always on Twitter hiatus. Email raffi@strategiccyber.com

Washington, DC
Vrijeme pridruživanja: studeni 2010.

Tweetovi

Blokirali ste korisnika/cu @armitagehacker

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @armitagehacker

  1. Prikvačeni tweet
    5. pro 2019.
    Poništi
  2. 5. velj

    I commissioned this comic in late-2011 to market what would become Cobalt Strike. I'm always amazed at how well the overall "story" has held up. Open question: How many pen testers "report in" with a salute to the customer CEO at the end of an engagement?

    Poništi
  3. proslijedio/la je Tweet
    27. sij

    Move Faster, Stay Longer blog about extending CS and tools to go with it.

    Poništi
  4. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  5. proslijedio/la je Tweet
    21. sij

    We released a Red Teaming book! Red Team Development and Operations. It's been a crazy project that has existed in many forms. It started as simple notes, came together as a SANS class, and will now live as a book. Read about it here.

    Poništi
  6. proslijedio/la je Tweet
    16. sij

    New tool coming soon... Zipper, a CobaltStrike tool written in C which allows you to compress files and folders from local and UNC paths. Useful for RedTeams when large files/folders need to be exfiltrated.

    Poništi
  7. proslijedio/la je Tweet
    4. sij

    I’ve wanted to get into writing C# .NET Assembly for awhile now. Wrote my first one this week to improve my opsec in ! No more running “shell icacls”

    Poništi
  8. proslijedio/la je Tweet
    11. sij

    Custom C# Stager that works with Cobalt Strike staged Payloads:

    Poništi
  9. proslijedio/la je Tweet
    11. sij

    Been going through 's Red Team Ops 2019 course on YouTube and holy shit is this good material. He provides so much great insight into methodologies and a red teamer mindset. Incredibly valuable even if you don't use Cobalt Strike.

    Poništi
  10. proslijedio/la je Tweet
    9. sij

    Spray-AD, a new Kerberos password spraying tool for Cobalt Strike that might come in handy when assessing Active Directory environments for weak passwords (generates event IDs 4771 instead of 4625).

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    8. sij

    Tired of typing in long strings with Cobalt Strike? Try these aliases - thanks for the template. If you have repositories with C# tooling I didn't list, leave a comment. More to come...

    Poništi
  12. proslijedio/la je Tweet

    What's more exciting than the beginning of 2020? 4.0 variants! Here's a walkthrough of some of the useful changes that come with the 4.0 release.⬇️

    Poništi
  13. 19. pro 2019.

    Found this Sept 2012 dialog w/ about Strategic Cyber, Cobalt Strike, and what I hoped to accomplish. Open knowledge, real insight into risk, & creative perspective to drive better security are my passions. It's why I'm here.

    Poništi
  14. 5. pro 2019.

    Today is still the likely release day. I'm finishing up some Aggressor Script documentation (it's always the last item :|) and then I can push the ship button. I've noticed the interest in this release and am very flattered. Doing my best to ship a good update.

    Poništi
  15. proslijedio/la je Tweet
    4. stu 2019.

    New blog post looking at how Cobalt Strike’s “blockdlls” command works, how to recreate it in our own payloads, and a quick look at Arbitrary Code Guard.

    Poništi
  16. proslijedio/la je Tweet
    8. lis 2019.

    The details of our next public Adversary Simulation and Red Team Tactics training are now available; seats are limited so sign up early to avoid disappointment

    Prikaži ovu nit
    Poništi
  17. 13. ruj 2019.

    "I like hand-crafted farm to table artisanal profiles" --

    Poništi
  18. proslijedio/la je Tweet
    12. ruj 2019.

    Red Team engagements rarely end at DA. The ones that don't require you to pivot and compromise specific users in the domain. SharpSniper query's event logs, to find those users' logon IP addresses

    Poništi
  19. proslijedio/la je Tweet
    3. ruj 2019.

    Check out a Windows persistence toolkit I wrote called SharPersist and will be presenting at on Saturday at 4pm

    Poništi
  20. proslijedio/la je Tweet

    New from - the highly anticipated tool! Its framework makes it easier for to experiment with different command and control communications. Check it ↓↓

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·