Chris

@xorrior

Pentester | Red Teamer | PowerShell & Empire Dev | specterops.io

MD
Joined April 2009

Tweets

You blocked @xorrior

Are you sure you want to view these Tweets? Viewing Tweets won't unblock @xorrior

  1. Pinned Tweet
    Oct 30

    Empire v2.3 is out. Please see the changelog for details

  2. Retweeted
    23 hours ago

    How sure are you that "(Verified) Microsoft Windows" refers to a program that actually originates from Microsoft? Code Signing Certificate Cloning Attacks and Defenses

  3. Retweeted
    19 hours ago

    Another instance where encourages us to rethink our views on digital signature validation.

  4. Retweeted
    Dec 21

    [Get-Doppelgangers] - Powershell script to detect process and dll doppelganging thx for the poc!

  5. Retweeted

    What if you can avoid all events ? Even the one saying you cleared all events ? 🙃

  6. Retweeted
    Dec 19

    We've open sourced our framework for developing alerting and detection strategies for incident response. We have also included several internal strategies as examples to spur greater sharing and collaboration with defenders.

  7. Retweeted
    Dec 15

    Are you really ready for ? What does your data look like? Data Availability != Data Quality

  8. Retweeted
    Dec 12

    Several weeks of research and several cease and desist letters later - the longest research paper I've ever written is now out. Read about the never-ending tale of OSX/Pirrit -

    Show this thread
  9. Retweeted
    Dec 12

    Our February training offering of Adversary Tactics: Red Team Operations is officially sold out. Waitlist is available. More course offerings to be announced shortly.

  10. Retweeted
    Dec 11

    Today I'm releasing Detection Lab, a personal project that uses Packer & Vagrant to quickly stand up up a fully customizable Windows Active Directory loaded with security tooling and some logging best practices. Blog: Github:

  11. Retweeted
    Dec 11
  12. Retweeted
    Dec 5

    I did a quick write-up on my method of getting BadIntent for Android set up.

    Show this thread
  13. Retweeted
    Dec 5
  14. Retweeted
    Dec 1
  15. Retweeted
    Dec 1
    Show this thread
  16. Retweeted
    Dec 1

    Atomic Sysmon configs individually mapped to the ATT&CK Matrix anyone? is on fire! All this now requires is a little code to enable selective merging of technique detections. Detection unit testing FTW! /cc

  17. Retweeted
    Nov 27

    As a follow-up to this experiment , I documented my process/experience/methodology developing the most secure Device Guard policy I could: "Adventures in Extremely Strict Device Guard Policy Configuration Part 1 — Device Drivers"

  18. Retweeted
    Nov 27

    Our resident application whitelisting breaker/expert, shows us the steps involved in developing one of the most strict types of Device Guard code integrity policies.

  19. Retweeted
    Nov 26

    Looking for more Linux *nix persistence mechanisms in Empire. Let me know if you use others than what's in Empire currently.

Loading seems to be taking a while.

Twitter may be over capacity or experiencing a momentary hiccup. Try again or visit Twitter Status for more information.

    You may also like

    ·