Wannabe Cybersecurity researcher. Pushing NVISO's red team forward OSCP/OSCE/GPEN/CRTP/CRTE/CRTO redteamer.tips #redteamfit Fanboy of trusted,mdsec and BHIS

Wakanda
Joined February 2014
Filter
Exclude
Time range
-
Near
Indeed @jonasLyk is a God when it comes to this stuff. :D
0
0
0
caught @jorgeorchilles in an epic moment :P @SANSOffensive 's webcast has ended, don't worry if you missed it, it will be available as a VOD in your SANS portal!
1
2
9
Starts in an hour! @jorgeorchilles & @Jean_Maes_1994 talk about joining #redteam, plus, a peek at what's coming in #SEC564: Red Team Exercises & Adversary Emulation Register now: sans.org/u/1a52 #OffensiveOps
0
2
2
Theoretically you could write your own amsi consumer and use kdu to abuse arbitrary kernel write to bypass the signing but installing avast was easier :P
0
0
2
How we did it was just install avast instead :p
1
0
3
Credits to the great @jonasLyk the hero we need, but don't deserve :-)
0
0
0
Operating from a restricted environment without outbound connectivity? Venom allows for port reuse and even works on Windows (to my surprise). Now you can set up a SOCKS proxy without disturbing the original service! Check it out 👉github.com/Dliv3/Venom
1
107
344
I was thinking about either joining in on 660 or jump straight to 760
0
0
2
If you think @hackthebox_eu is "lame" or "easy" I'd suggest watching @ippsec's rope2 video.
14
12
123
I understood some of these words
1
0
2