Hacker, Security Consultant and Researcher @MDSecLabs

United Kingdom
Joined August 2011
DTM retweeted
We’re very happy to announce dates for our next public Adversary Simulation and Red Team Tactics Training are now available... eventbrite.com/e/adversary-s…
1
26
90
Had the @MDSecLabs monthly red team meeting this morning, listening to some of the tooling updates coming from @peterwintrsmith and @modexpblog gets me giddy.... something BIG is coming #watchthisspace #nighthawk #wehavealogo 😎
2
2
33
GIF
Played around with OffensiveNim. First time coding in Nim😅in fact I hadn't even heard of it prior to this project! Managed to write some code to encrypt shellcode then adapt @byt3bl33d3r's shellcode example to decrypt shellcode pop a beacon🧨Look forward to playing more 🙏
Just made the OffensiveNim repository public. This is a couple of weeks worth of notes and research into using Nim for general offensive operations. If you don't want to write your implants in C/C++, Nim is the way to go IMHO. Feedback welcom github.com/byt3bl33d3r/Offen…
3
19
76
GIF
DTM retweeted
A Fresh Outlook on Mail Based Persistence - a new blog post by @domchell mdsec.co.uk/2020/11/a-fresh-… #redteam
4
86
199
Just pushed a new blog post to the @MDSecLabs blog on Outlook based persistence - mdsec.co.uk/2020/11/a-fresh-…
7
204
461
DTM retweeted
Today we’re very happy to welcome @BaffledJimmy to the @MDSecLabs fam
4
3
43
GIF
#FF to @peterwintrsmith for his help and for generally being awesome 😎
1
0
17
A few months ago, I reversed the surprisingly interesting virtual machine running apps on my watch. I wrote an @Atredis blog post about it and described some bugs that fell out along the way: atredis.com/blog/2020/11/4/g…
3
55
128
DTM retweeted
If you're bored of sysmon, here's a quick an dirty one liner to disable it. logman stop EventLog-Microsoft-Windows-Sysmon-Operational -ets Just make sure you run it as system.
1
76
267