Advertisement · 728 × 90

Posts by

Preview
Nemesis 2.2 - SpecterOps Nemesis 2.2 introduces large disk image processing, LLM agents for automated finding triage and credential analysis, full Chromium DPAPI decryption support, host reporting, and significant performance...

If a host is compromised, what risk does that data represent?

Nemesis 2.2 helps answer that.

✅ Large container processing
✅ Host-based reporting
✅ AI-assisted triage
✅ Full Chromium DPAPI handling

Read @harmj0y.bsky.social + @tifkin.bsky.social's latest blog post: https://ghst.ly/4l2DDbl

1 month ago 2 1 0 0
Video

The macOS Hardened Runtime isn’t a dead end for in-memory execution. In his latest post, Kyle Avery looks at the 'allow-jit' entitlement and demonstrates shellcode execution in apps that have it.
www.outflank.nl/blog/2026/02/19/macos-ji...

2 months ago 4 2 0 0

I'd like to thank all of our sponsors for 2025. I'd also really, really, really, want to thank @MDSecLabs, @TrustedSec, @TorGuard, ... and all the individual donors.

Thanks to you, I don't need to beg for money on the internet and can focus on kitty cat pictures and malware.

3 months ago 12 1 0 0
Preview
macOS DYLIB Injection at Scale: Designing a Self-Sufficient Loader Let’s explore Dylib injection and Dylib proxying on macOS (the equivalent of Windows DLL injection)

Binary injection vulnerabilities can be found in many MacOS apps. Those may be abused to bypass EDR, hide backdoor, access memory, or bypass TCC!

DarwinOps provides
- An advanced injection vulnerability scanner
- A redteam scenario to exploit them

#redteam

blog.balliskit.com/macos-dylib-...

7 months ago 4 2 0 0
Preview
GitHub - SpecterOps/Nemesis: An offensive data enrichment pipeline An offensive data enrichment pipeline. Contribute to SpecterOps/Nemesis development by creating an account on GitHub.

Lots of cool new Nemesis features merging in soon from @tifkin_ and I! Development definitely didn't stop with the 2.0 release :) github.com/SpecterOps/N...

7 months ago 5 1 0 0
Preview
The Phrack leak: Examining an APT’s workstation In August 2025, two anonymous researchers released 9 GB of data from a workstation of a likely advanced persistent threat (APT) group. Here’s an analysis of the data by Intel 471’s Cyber Geopolitical ...

Thanks for the excellent writeup @intel471.bsky.social

www.intel471.com/blog/the-phr...

7 months ago 19 5 0 0
Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.

Screenshot showing the output of the proof-of-concept tool "SMAStorageDump", where ACCs are dully decrypted.

🆕 New blog post!

"Offline Extraction of Symantec Account Connectivity Credentials (ACCs)"

Following my previous post on the subject, here is how to extract ACCs purely offline.

👉 itm4n.github.io/offline-extr...

#redteam #pentesting

10 months ago 11 4 3 0
Post image

We are proud to introduce #dAWShund to the world: a framework for putting a leash on naughty AWS permissions. dAWShund helps blue and red teams find resources in #AWS, evaluate their access levels and visualize the relationships between them.

falconforce.nl/dawshund-fra...

#blueteaming #redteaming

1 year ago 11 3 1 0

With putty, there’s a nice little trick you can do to enable connection sharing and piggy back off their session… helps get around things like mfa 🙃

1 year ago 4 0 1 0
Post image

Our red team is growing and we have a rare open position for a Principal RT Operator - if this sounds like you, get in touch 🙏

1 year ago 4 3 0 0
Advertisement
Preview
Fileless lateral movement with trapped COM objects | IBM New research from IBM X-Force Red has led to the development of a proof-of-concept fileless lateral movement technique by abusing trapped Component Object Model (COM) objects. Get the details.

[Blog] This ended up being a great applied research project with my co-worker Dylan Tran on weaponizing a technique for fileless DCOM lateral movement based on the original work of James Forshaw. Defensive recommendations provided.

- Blog: ibm.com/think/news/f...
- PoC: github.com/xforcered/Fo...

1 year ago 15 11 0 1

Prodaft has published a technical analysis of Anubis, a new Python-based backdoor linked to Savage Ladybug (FIN7) operations

catalyst.prodaft.com/public/repor...

1 year ago 8 2 0 0
Preview
Blind Eagle: …And Justice for All - Check Point Research Key Points Introduction APT-C-36, also known as Blind Eagle, is a threat group that engages in both espionage and cybercrime. It primarily targets organizations in Colombia and other Latin American co...

The Blind Eagle APT group has compromised over 1,600 victims inside Colombian institutions and government agencies.

The campaign took place in November & December of last year and used an exploit similar to a zero-day exploited by Russian hackers in Ukraine.

research.checkpoint.com/2025/blind-e...

1 year ago 9 6 0 0
Preview
GitHub - decoder-it/KrbRelayEx-RPC Contribute to decoder-it/KrbRelayEx-RPC development by creating an account on GitHub.

KrbRelayEx-RPC tool is out! 🎉
Intercepts ISystemActivator requests, extracts Kerberos AP-REQ & dynamic port bindings and relays the AP-REQ to access SMB shares or HTTP ADCS, all fully transparent to the victim ;)
github.com/decoder-it/K...

1 year ago 9 10 0 0
Preview
C2 Beaconing Detection with MDE Aggregated Report Telemetry Detecting C2 Beaconing using MDE Aggregated Report Telemetry.

🚨 Detect C2 Beacons!

New Microsoft Defender for Endpoint telemetry provides new opportunities for threat detection!

🔗
academy.bluraven.io/blog/beaconi...


#ThreatHunting #DetectionEngineering #MDE

1 year ago 8 3 0 0
Preview
a bald man says " make it so " in front of a blurred background ALT: a bald man says " make it so " in front of a blurred background
1 year ago 1 0 0 0

Haha you’re clutching at straws there!

You should be honoured to get my first post 😂

1 year ago 0 0 1 0

So when’s your last day at Fortra? 🙃

1 year ago 1 0 1 0
Post image

It appears Microsoft quietly mitigated most of the risk of the "Intune company portal" device compliance CA bypass by restricting the scope of Azure AD graph tokens issued to this app, making them almost useless for most abuse scenarios. Thx @domchell.bsky.social for the heads up.

1 year ago 29 9 0 0