Principal Security Consultant @MDSecLabs | Red Team | Adversary Simulation

United Kingdom
Joined January 2012
Move Aside Script Kiddies–Malware Execution in the Age of Advanced Defen... invidious.snopyta.org/wTmQ5FaRmf4 @joff_thyer
0
0
2
Jamie Shaw retweeted
Breaking the Browser: a tale of IPC, credentials and backdoors... new research and tools by @_batsec_ on how to tap chrome mdsec.co.uk/2021/01/breaking…
9
116
208
Have you checked out the recordings from the "Adversary Emulation" Roundup on our YouTube channel? You can find presentations by @forrestcarver, @joff_thyer, @Adam_Mashinchi, @Krelkci, @Rev10D, and @wh33lhouse. @jorgeorchilles MC'd. Watch the videos here: invidious.snopyta.org/playlist?list=PL…
0
11
16
Jamie Shaw retweeted
I wrote a blog & proof of concept for a Beacon Object File that performs remote process injection via thread hijacking instead of spawning a new thread. This was a lot of fun & I’m glad operators who leverage Cobalt Strike can now run in-memory C tools!! connormcgarr.github.io/threa…
4
154
346
Show this thread