Advertisement · 728 × 90

Posts by Marc André Tanner

Post image

WinGet can be more than a package manager. We show how .𝚠𝚒𝚗𝚐𝚎𝚝 configs + a self-referencing LNK become a viable initial access payload when Microsoft Store is enabled. Includes detection queries & mitigation tips.
blog.compass-security.com/2026/03/wing...
#RedTeam #Windows #LOLBins #InitialAccess

1 month ago 4 3 0 0
Bitpixie presentation

Bitpixie presentation

Last week presented at an university alumni event, this week successfully used during a red teaming engagement.

4 months ago 1 0 0 0

🧭 Navigation complete! The team from Compass Security just charted a course straight into @home_assistant Green at #Pwn2Own. They head off to the disclosure room to spill how they did it. #P2OIreland

5 months ago 5 3 0 0

After some more tests and helpful community feedback I managed to successfully exploit the same testing device using the WinPE method. The blog post has been updated with a corresponding demonstration video.

8 months ago 1 0 0 0

Now merged into Certipy 5.0.2

10 months ago 2 0 0 0

Curious why I was rebooting random laptops?

Credit goes to Rairii for the original research and Thomas from @neodyme.io for the initial PoC.

10 months ago 4 0 1 0
SOCON swag

SOCON swag

Last week I had a fantastic experience at @specterops.bsky.social's #SOCON2025 and subsequent IDOT training. It was a great opportunity to get in touch with leading experts. Apparently I also bugged them enough to merge my small BloodHound contribution. github.com/SpecterOps/B...

11 months ago 8 1 0 0
Preview
Force recent MFA login by victim by martanne · Pull Request #5 · CompassSecurity/TokenPhisher This adds the ngcmfa claim when initiating the device code flow. The underlying request should be identical to what Dirk-jan eventually implemented for roadtx auth --device-code --force-ngcmfa ... ...

TokenPhisher now forces recent MFA logins from victims which comes in handy when emulating these device code phishing tactics: github.com/CompassSecur...

1 year ago 1 0 0 0
Preview
Storm-2372 conducts device code phishing campaign | Microsoft Security Blog Microsoft Threat Intelligence Center discovered an active and successful device code phishing campaign by a threat actor we track as Storm-2372. Our ongoing investigation indicates that this campaign ...

www.microsoft.com/en-us/securi...

1 year ago 1 0 1 0
Post image

Avoid LDAP monitoring by leveraging local registry data with certipy parse! Check out our latest pull request and read Marc Tanner’s (@brain-dump.org) blog post: blog.compass-security.com/2025/02/stea...

1 year ago 8 4 0 1
Advertisement