Wannabe Cybersecurity researcher. Pushing NVISO's red team forward OSCP/OSCE/GPEN/CRTP/CRTE/CRTO redteamer.tips #redteamfit Fanboy of trusted,mdsec and BHIS

Wakanda
Joined February 2014
2021 goals: * work on more content for redteamer.tips * give a solo teach of SEC699 * talk at a con * become better in C++ * do some collabs * help get more people into infosec (specifically red teaming) *(Hopefully) find a "new" EoP What are your goals for 2021?
10
5
67
caught @jorgeorchilles in an epic moment :P @SANSOffensive 's webcast has ended, don't worry if you missed it, it will be available as a VOD in your SANS portal!
1
2
8
Starts in an hour! @jorgeorchilles & @Jean_Maes_1994 talk about joining #redteam, plus, a peek at what's coming in #SEC564: Red Team Exercises & Adversary Emulation Register now: sans.org/u/1a52 #OffensiveOps
0
2
2
Operating from a restricted environment without outbound connectivity? Venom allows for port reuse and even works on Windows (to my surprise). Now you can set up a SOCKS proxy without disturbing the original service! Check it out 👉github.com/Dliv3/Venom
1
106
343
If you think @hackthebox_eu is "lame" or "easy" I'd suggest watching @ippsec's rope2 video.
14
12
123
This wont be your every day webcast ;-). Jorge and myself are going to talk about what got us into the field, how YOU can get in the field and we're gonna show you where to start playin' around. Obviously mostly tailored for new(ish) players in the field, but EVERYONE is welcome!
So you want to be a red teamer? Join @Jean_Maes_1994 and I as we cover what red team is, why you may want to be a red teamer, and how to become a red teamer. #redteam @SANSOffensive #SEC564 sans.org/webcasts/117885 Check out his blog in the meantime: redteamer.tips/so-you-want-t…
1
0
6
noice!
This tweet is unavailable
0
0
1
seeing the epic swag of @JenkinsIsTheWay makes me miss my CI/CD days. kudos on the cool designs! I still have my jedi master jenkins sticker somewhere.. :')
1
0
2