Wannabe Cybersecurity researcher. Pushing NVISO's red team forward OSCP/OSCE/GPEN/CRTP/CRTE/CRTO redteamer.tips #redteamfit Fanboy of trusted,mdsec and BHIS

Wakanda
Joined February 2014
2021 goals: * work on more content for redteamer.tips * give a solo teach of SEC699 * talk at a con * become better in C++ * do some collabs * help get more people into infosec (specifically red teaming) *(Hopefully) find a "new" EoP What are your goals for 2021?
10
5
67
Indeed @jonasLyk is a God when it comes to this stuff. :D
0
0
0
caught @jorgeorchilles in an epic moment :P @SANSOffensive 's webcast has ended, don't worry if you missed it, it will be available as a VOD in your SANS portal!
1
2
9
Starts in an hour! @jorgeorchilles & @Jean_Maes_1994 talk about joining #redteam, plus, a peek at what's coming in #SEC564: Red Team Exercises & Adversary Emulation Register now: sans.org/u/1a52 #OffensiveOps
0
2
2
Theoretically you could write your own amsi consumer and use kdu to abuse arbitrary kernel write to bypass the signing but installing avast was easier :P
0
0
2
How we did it was just install avast instead :p
1
0
3
Credits to the great @jonasLyk the hero we need, but don't deserve :-)
0
0
0
Operating from a restricted environment without outbound connectivity? Venom allows for port reuse and even works on Windows (to my surprise). Now you can set up a SOCKS proxy without disturbing the original service! Check it out 👉github.com/Dliv3/Venom
1
107
344
I was thinking about either joining in on 660 or jump straight to 760
0
0
2