Dominic Chell

@domchell

Purveyor of the finest offsec tools at , creator or /r/redteamsec and co-author of the Mobile App Hacker's Handbook

Manchester, England
Vrijeme pridruživanja: veljača 2009.

Tweetovi

Blokirali ste korisnika/cu @domchell

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @domchell

  1. proslijedio/la je Tweet
    Poništi
  2. proslijedio/la je Tweet
    30. sij

    Ever wanted to take a peek at the mimikatz sekurlsa::msv internals? New blog post is all about it plus, it also showcases PyKDumper, a tool that dumps LSASS credentials through WinDBG/PyKD.

    Poništi
  3. proslijedio/la je Tweet
    2. velj

    KDU, Kernel Driver Utility - driver loader (and not only) bypassing Windows x64 Driver Signature Enforcement with support of various "functionality" providers - including Unwinder's RTCore,

    Poništi
  4. proslijedio/la je Tweet
    1. velj

    Myself and are off to USA 2020 to deliver our Adversary Simulation and Red Team Tactics course. Stay tuned for some upcoming posts on how the supporting labs were created

    Poništi
  5. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  6. 31. sij
    Poništi
  7. 31. sij

    Awesome work finding an RCE in SharePoint by which also affected SharePoint Online

    Poništi
  8. proslijedio/la je Tweet
    31. sij

    and will be bringing our popular Adversary Simulation and Red Team Tactics training to the US this year at

    Poništi
  9. proslijedio/la je Tweet
    31. sij
    Odgovor korisnicima

    Congratulations! It is awesome training. Wish you the best!

    Poništi
  10. 31. sij

    Very excited to announce and me will be bringing our training to Vegas this August for - we'll follow up soon with some revelations on what makes this course so exciting!

    Poništi
  11. proslijedio/la je Tweet
    30. sij

    And now with have with some knowledge on popping Firefox

    Poništi
  12. proslijedio/la je Tweet
    30. sij

    And next up to the have Taha talking about Kubernetes for pentesters! 👍

    Poništi
  13. proslijedio/la je Tweet
    30. sij

    The first speaker on tonight’s team research night is detailing how to bypass Cylance using syscalls for API unhooking

    Poništi
  14. proslijedio/la je Tweet
    27. sij
    Poništi
  15. proslijedio/la je Tweet
    27. sij

    Attended this last year, can't recommend it enough. and were super friendly and answered all the daft questions I had. Content was upto date and full of stuff I hadn't seen before. 100% worth it. Still feel sorry for that poor projector though...

    Poništi
  16. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  17. 27. sij

    This sold out pretty sharpish last time, and the waiting list has already swiped a few seats so if you’re interested move quickly! 😁

    Poništi
  18. proslijedio/la je Tweet
    26. sij

    Some study notes on LSASS hooking for harvesting interactive logon credentials. Thanks to for his inspiring posts about mimikatz.

    Poništi
  19. proslijedio/la je Tweet
    26. sij
    Poništi
  20. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·