n00py

@n00py1

Retweeter of InfoSec/Offsec/Pentest/Red Team. Occasional blogger. 90% 1337 hax with an occasional dad post.

Colorado, USA
Vrijeme pridruživanja: ožujak 2015.

Tweetovi

Blokirali ste korisnika/cu @n00py1

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @n00py1

  1. Prikvačeni tweet
    4. lip 2018.

    List of tools I've been collecting since I started pen-testing. Curated and organized.

    Poništi
  2. 5. velj

    I’ve thought about buying a proper mitt, but I honeslty find this crocodile too funny to switch out.

    Poništi
  3. 5. velj

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    Really glad to finally get a blogpost out about this. Hopefully this is useful and gives Red Teamers ideas on how to use the BYOI concept in their own payloads. If anyone is interested in a few more follow up posts about this will gladly oblige :)

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  6. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  7. proslijedio/la je Tweet
    4. velj
    Poništi
  8. 3. velj

    For those of you who work from home with (fussy) children. How do you work without going insane? Headphones? Coffee shop?

    Poništi
  9. proslijedio/la je Tweet
    1. velj

    I was tired of outdated XSS cheat sheets that don't touch on frameworks, html5, filter bypasses and other important stuff, so I made my own. I hope you find it as useful as I do. :)

    Poništi
  10. proslijedio/la je Tweet
    1. velj

    Some essential process execution/cmd lines to monitor for initial access/persist. powershell cmd rundll32 control wscript javaw csc regsvr32 reg certutil bitsadmin schtasks wmic eqnedt32 msiexec cmstp mshta hh curl installutil regsvcs/regasm at msbuild sc cscript msxsl runonce

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    31. sij

    I'm social engineered in real time on this! 😅😇 Thanks for coming on !!

    Poništi
  12. 1. velj

    Imagine if your entire product offering amounted to a bash one-liner piping curl to grep.

    Tweet je nedostupan.
    Poništi
  13. proslijedio/la je Tweet
    31. sij

    Want to see how the red team weaponizes threat intel for R&D and TTP development? Check out some research I did with and . Also includes some new executables that can be used for DLL abuse.

    Poništi
  14. 31. sij

    I never reboot my VMs, but when I do it’s because the clipboard stopped working.

    Poništi
  15. proslijedio/la je Tweet
    30. sij
    Poništi
  16. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  17. proslijedio/la je Tweet
    28. sij

    New tool to play with 😀 For those who may not be aware, there is a new Nessus licence called Nessus Essentials, which is a free copy of Nessus!

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    Windows Defender got you feeling down? Here is a simple trick to load your meterpreter payloads past Windows Defender

    Poništi
  19. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    27. sij

    Just pushed a somewhat big update to SILENTTRINITY with a lot of forward compatibility fixes for Python 3.8 and made the PowerShell "stageless" stager public. Plus more modules and bug fixes

    Poništi
  21. proslijedio/la je Tweet
    26. sij

    2019 may have been year of the C2, but according to the Chinese New Year calendar, 2020 is the year of the RAT 🇨🇳💻🐀

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·