Technical architect @SpecterOps. Code: Empire | BloodHound | GhostPack | PowerSploit | Veil-Framework. One time I broke forest trusts with @tifkin_

Seattle, WA
Joined August 2012
Congrats!
0
0
4
Nice work!
0
0
1
Introduction episode coming January 11th, with @jaredcatkinson and @jsecurity101 hosting, and @v3r5ace as producer. This will be available wherever you listen to podcasts. We are all excited to start getting content out to you, drop a follow to keep updated!
2
20
34
Will retweeted
People didn't understand what we were talking about 3 years ago. Remember #Golden #SAML from 2017? @gentilkiwi @TalBeerySec @ShakReiner @CyberArk Here it is: cyberark.com/resources/threa… [Nov, 2017] #Innovation
1
13
41
Cool stuff!!
1
0
5
Sysmon ProcessAccess snippet for Rubeus monitor gist.github.com/Antonlovesdn…
2
25
76
All video and slide content from SO-CON 2020 has been posted to our website. Check them out: specterops.io/so-con2020 Also, YouTube playlist link: invidious.snopyta.org/playlist?list=PL… Thank you again to all of the attendees!
0
124
243
Will retweeted
Built some automation to help with dumping cookies using Chromium's remote debugger. This technique works against Chromium browsers (Google Chrome, Microsoft Edge, etc.) on any OS! I dig into how the technique works and present my implementation posts.specterops.io/hands-in…
6
78
186
Show this thread