Ruslan Sayfiev

@cryptopeg

Penetration testing & Red Teaming

Tokyo, Japan
Vrijeme pridruživanja: siječanj 2014.

Tweetovi

Blokirali ste korisnika/cu @cryptopeg

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @cryptopeg

  1. proslijedio/la je Tweet
    prije 22 sata

    Custom Signed Kernel Driver's Pretty cool 😃 Without the need to enable TestSigning. Sample Project:

    Poništi
  2. proslijedio/la je Tweet
    2. velj

    Can your EDR detect symbolic link callback rootkits? Because ours sure as heck can't. and I wrote about these!

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    SettingSyncHost.exe as a LolBin cd %TEMP% & c:\windows\system32\SettingSyncHost.exe -LoadAndRunDiagScript foo

    Poništi
  4. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  5. proslijedio/la je Tweet
    2. velj
    Poništi
  6. proslijedio/la je Tweet
    2. velj
    Poništi
  7. proslijedio/la je Tweet
    1. velj

    Myself and are off to USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    Pushed a new Rubeus release after getting some additional feedback from our most recent AT:RTO students. The full changes are detailed here . To highlight a few new features- "/nowrap" globally prevents base64 blobs from line-wrapping, (1/4)

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  10. proslijedio/la je Tweet
    31. sij

    and will be bringing our popular Adversary Simulation and Red Team Tactics training to the US this year at

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    In his post, "Detection Engineering using Apple’s Endpoint Security Framework," illustrates how you can use ESF to detect In-Memory Execution on endpoints. Check it out:

    Poništi
  12. proslijedio/la je Tweet
    29. sij

    AD Privilege Escalation Exploit: The Overlooked ACL

    Poništi
  13. proslijedio/la je Tweet
    29. sij

    I added a mimikatz MemSSP style hook to Fermion, you can check out the code here => This is based on the great write-ups by &

    Poništi
  14. proslijedio/la je Tweet
    28. sij

    From the folks that brought you Atomic Red Team, Chain Reactor is a new open source framework for composing executables that simulate adversary behaviors and techniques on Linux endpoints.

    Poništi
  15. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  16. proslijedio/la je Tweet
    28. sij

    ICYMI - released MoveKit and StayKit, a collection of aggressor scripts, .NET projects, and templates to enhance lateral movement and persistence on your engagements. Link: MoveKit: StayKit:

    Poništi
  17. proslijedio/la je Tweet
    25. sij

    I wrote some automation around gophish, evilginx2, and postfix for faster phishing deployment. Looking for feedback and pull requests :D

    Poništi
  18. proslijedio/la je Tweet
    24. sij

    Post-exploitation tip: Do you know how to trivially & remotely hijack an session without prompt nor warning on user's side using signed binary (no patch/multi-session) ? qwinsta+mstsc shadowing is the answer ;) Details:

    Poništi
  19. proslijedio/la je Tweet
    24. sij

    Starting to put together a Linux Privesc Video. Can anyone spot something non-network that I'm missing? - Recon (linPEAS/LinEnum) - Sudo - Permission Overview (file writes - sshKey/cron) - SetUID - Kernel - Cron - Network [mysql, postgres, erlang cookie (couchDb)]

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    23. sij

    v2 is out 🔥 🔸Dump credentials on multiple hosts 🔸New dumping method using () thanks to 🤗 🔸Can be used as a in other python project 🔸Fully documented wiki ! Needs some testing, open issues if need be 🙃

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·