pawb.fun is one of the many independent Mastodon servers you can use to participate in the fediverse.
This instance aimed at any and all within the furry fandom, though anyone is welcome! We're friendly towards members of the LGBTQ+ community and aiming to offer a safe space for our users.

Server stats:

303
active users

#redteaming

0 posts0 participants0 posts today
Erik Jonker<p>"Lessons From Red Teaming 100 Generative AI Products"<br><a href="https://mastodon.social/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a> <a href="https://mastodon.social/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://mastodon.social/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a><br><a href="https://arxiv.org/abs/2501.07238" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">arxiv.org/abs/2501.07238</span><span class="invisible"></span></a></p>
Agostino Panico<p>It is an honor for me that my talk <a href="https://infosec.exchange/tags/Hacking" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Hacking</span></a> the Skies - <a href="https://infosec.exchange/tags/Satellite" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>Satellite</span></a> <a href="https://infosec.exchange/tags/RedTeaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeaming</span></a> is been accepted at <span class="h-card" translate="no"><a href="https://bird.makeup/users/redteamvillage_" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>redteamvillage_</span></a></span> at <span class="h-card" translate="no"><a href="https://defcon.social/@defcon" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>defcon</span></a></span> ... If you are planning to be there stop-by it's going to be fun!! ☺️</p>
postmodern<p>For a tool that compiles C payloads, how would you prefer to specify the cross-compiler?<br><a href="https://infosec.exchange/tags/payloads" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>payloads</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/exploitdev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>exploitdev</span></a></p>
Bishop Fox<p>Join our session to get real-world perspective into the necessity of <a href="https://infosec.exchange/tags/RedTeaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeaming</span></a>; Trevin Edgeworth (Bishop Fox Red Team Practice Director) will delve into how this key <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> practice can help unveil <a href="https://infosec.exchange/tags/security" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>security</span></a> gaps, optimize resource allocation, and deliver scenario-based <a href="https://infosec.exchange/tags/testing" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>testing</span></a>. Register for this event happening October 24th! <a href="https://bfx.social/3Q44Cpa" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3Q44Cpa</span><span class="invisible"></span></a></p>
dismantl :donor:<p>I am in the job market for a remote red team or offensive security engineer role. I am seasoned full-stack software developer, a OSCP-certified pentester (currently working on CRTO), and system administrator with plenty of cloud experience.</p><p>Before my current role leading the IT &amp; Cybersecurity team at NNAF, I did security research (including developing an improved reflective DLL injection technique [0] that helped inspire the widely used sRDI project [1][2] and has been cited by academics and other security researchers [3][4][5]) and performed pentesting and appsec for a variety of clients from global hedge funds to healthcare to aerospace engineering. Prior to that I did low-level embedded firmware development and experimental research for a wireless mesh networking platform.</p><p>For the last year I have been building an advanced, fully-featured red teaming/adversary simulation platform (which I am happy to demo for potential employers), including a web-based multi-user team server, scriptable API, a cross-platform flagship agent with novel evasion techniques, a variety of cross-platform payloads and stagers, relaying and pivoting, and an easily-extensible set of C2 protocols, both synchronized and asynchronous.</p><p>I am an excellent verbal and written communicator, comfortable translating highly technical topics for a variety of audiences from executives to engineers, and have consistently produced high quality reports for clients. I have experience programming in almost a dozen languages and am quick to learn new technologies.</p><p>Boosts appreciated!</p><p>[0] <a href="https://disman.tl/2015/01/30/an-improved-reflective-dll-injection-technique.html" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">disman.tl/2015/01/30/an-improv</span><span class="invisible">ed-reflective-dll-injection-technique.html</span></a><br>[1] <a href="https://www.netspi.com/blog/technical/adversary-simulation/srdi-shellcode-reflective-dll-injection/" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">netspi.com/blog/technical/adve</span><span class="invisible">rsary-simulation/srdi-shellcode-reflective-dll-injection/</span></a><br>[2] <a href="https://github.com/monoxgas/sRDI" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">github.com/monoxgas/sRDI</span><span class="invisible"></span></a><br>[3] <a href="https://www.oic-cert.org/en/journal/pdf/1/1/116.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">oic-cert.org/en/journal/pdf/1/</span><span class="invisible">1/116.pdf</span></a><br>[4] <a href="https://euskalhack.org/securitycongress/PDF/Understanding_a_payload's_life.pdf" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">euskalhack.org/securitycongres</span><span class="invisible">s/PDF/Understanding_a_payload's_life.pdf</span></a><br>[5] <a href="https://posts.specterops.io/merlin-v0-7-0-release-roll-up-717739cde77a" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">posts.specterops.io/merlin-v0-</span><span class="invisible">7-0-release-roll-up-717739cde77a</span></a></p><p><a href="https://infosec.exchange/tags/infosecjobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecjobs</span></a> <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/fedihire" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>fedihire</span></a> <a href="https://infosec.exchange/tags/FediHired" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>FediHired</span></a> <a href="https://infosec.exchange/tags/jobs" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobs</span></a> <a href="https://infosec.exchange/tags/jobhunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>jobhunting</span></a> <a href="https://infosec.exchange/tags/JobSearch" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>JobSearch</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a> <a href="https://infosec.exchange/tags/malwaredev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwaredev</span></a> <a href="https://infosec.exchange/tags/maldev" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>maldev</span></a> <a href="https://infosec.exchange/tags/hireme" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>hireme</span></a></p>
IT News<p>AI-powered grocery bot suggests recipe for toxic gas, “poison bread sandwich” - Enlarge (credit: PAK'nSAVE) </p><p>When given a list of harmful ingre... - <a href="https://arstechnica.com/?p=1960122" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">arstechnica.com/?p=1960122</span><span class="invisible"></span></a> <a href="https://schleuss.online/tags/largelanguagemodels" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>largelanguagemodels</span></a> <a href="https://schleuss.online/tags/machinelearning" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>machinelearning</span></a> <a href="https://schleuss.online/tags/newzealand" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>newzealand</span></a> <a href="https://schleuss.online/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://schleuss.online/tags/aiethics" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aiethics</span></a> <a href="https://schleuss.online/tags/aisafety" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>aisafety</span></a> <a href="https://schleuss.online/tags/paknsave" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>paknsave</span></a> <a href="https://schleuss.online/tags/gpt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpt</span></a>-3.5 <a href="https://schleuss.online/tags/biz" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>biz</span></a>⁢ <a href="https://schleuss.online/tags/openai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>openai</span></a> <a href="https://schleuss.online/tags/gpt" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>gpt</span></a>-3 <a href="https://schleuss.online/tags/tech" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>tech</span></a> <a href="https://schleuss.online/tags/ai" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>ai</span></a></p>
Bishop Fox<p>Embrace the art and the skillset of <a href="https://infosec.exchange/tags/RedTeaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>RedTeaming</span></a>! In this <a href="https://infosec.exchange/tags/BFLive" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BFLive</span></a> session, expert speakers Barrett Darnell, Savannah Lazzara, and Wes Thurner will unveil the secrets of stealthy infiltration, empower you with the latest attack vectors, and guide you on how to communicate your findings like a true hacker. </p><p>Watch the <a href="https://infosec.exchange/tags/DEFCON" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>DEFCON</span></a> livestream Aug. 11 at 12:50 PM PT! <a href="https://bfx.social/3rK2jxS" rel="nofollow noopener noreferrer" translate="no" target="_blank"><span class="invisible">https://</span><span class="">bfx.social/3rK2jxS</span><span class="invisible"></span></a></p>
Cybiere<p>Hey mastodon !<br>I was too lazy to keep digging for interesting new people in my solo instance, so I'm unpacking here on infosec.exchange !</p><p>Short <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> : I might toot in French and English, mostly speaking about <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> , mostly from a <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> point of view, but I'm also interested in blue teaming, coding and sys/net admin. </p><p>I'm interested in free software (as in free speech), photography, music, motorbike rides and beautiful places !</p><p>Thanks <span class="h-card" translate="no"><a href="https://infosec.exchange/@jerry" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>jerry</span></a></span> and all the infosec.exchange team for this instance, and see you all around !</p>
Astra Kernel :verified:<p>🖥️ Kerbrute tool</p><p>👉 Enumerate valid AD user accounts that use Kerberos pre-authentication</p><p>👉 Password bruteforce,username enumeration,password spray</p><p>GitHub repo:<br><a href="https://github.com/ropnop/kerbrute" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/ropnop/kerbrute</span><span class="invisible"></span></a></p><p>Detailed guide: <br><a href="https://www.hackingarticles.in/a-detailed-guide-on-kerbrute/" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">hackingarticles.in/a-detailed-</span><span class="invisible">guide-on-kerbrute/</span></a></p><p><a href="https://infosec.exchange/tags/kerberos" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kerberos</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/redteamtips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteamtips</span></a> <a href="https://infosec.exchange/tags/kali" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kali</span></a> <a href="https://infosec.exchange/tags/kalilinux" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>kalilinux</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a></p>
r1cksec<p>I have written a tool to enumerate LinkedIn employees of a company using Google dorks.<br>Yes, I know there are already tools that cover this subject.<br>However, none of these tools was suitable for my Recon framework. 🕵️​ 🔍​</p><p><a href="https://github.com/r1cksec/thot/blob/master/scripts/dork-linkedIn-employees" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/r1cksec/thot/blob/m</span><span class="invisible">aster/scripts/dork-linkedIn-employees</span></a></p><p><a href="https://infosec.exchange/tags/recon" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>recon</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/linkedin" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>linkedin</span></a> <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a></p>
Astra Kernel :verified:<p>😎 Just came to know about this github pull request (shared by one of the followers)</p><p><a href="https://github.com/danielmiessler/SecLists/pull/155" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/danielmiessler/SecL</span><span class="invisible">ists/pull/155</span></a></p><p>Special thanks to <span class="h-card"><a href="https://infosec.exchange/@dismantl" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dismantl</span></a></span> for sharing with me 😊👍</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/websec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>websec</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a></p>
Astra Kernel :verified:<p>Could this be true?</p><p>Our body heat increases after getting infected by viruses because the virus is trying to mine cryptocurrency 😳</p><p><a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/bugbounty" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>bugbounty</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/malwareanalysis" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malwareanalysis</span></a> <a href="https://infosec.exchange/tags/malware" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>malware</span></a></p>
Astra Kernel :verified:<p><a href="https://infosec.exchange/tags/infosecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosecurity</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/BugHunters" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>BugHunters</span></a> <a href="https://infosec.exchange/tags/redteamingtips" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteamingtips</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a></p>
Damon Mohammadbagher ✅<p>[ <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/pentest" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentest</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> <a href="https://infosec.exchange/tags/blueteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>blueteam</span></a> ]</p><p>Some RedTeamers/Pentesters/SecurityResearchers Source Codes Added to List: [full list link =&gt; <a href="https://github.com/DamonMohammadbagher/Some_Pentesters_SecurityResearchers_RedTeamers/blob/main/README.md" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/DamonMohammadbagher</span><span class="invisible">/Some_Pentesters_SecurityResearchers_RedTeamers/blob/main/README.md</span></a>]</p><p>list of new codes: </p><p>+ [offensive] @rad9800 , (TamperingSyscalls is alternative solution to direct syscalls) =&gt; <a href="https://github.com/rad9800/TamperingSyscalls" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/rad9800/TamperingSy</span><span class="invisible">scalls</span></a> <br>! [defensive] <span class="h-card"><a href="https://infosec.exchange/@thefLinkk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thefLinkk</span></a></span> , (Hunt-Sleeping-Beacons. Aims to identify sleeping beacons) =&gt; <a href="https://github.com/thefLink/Hunt-Sleeping-Beacons" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/thefLink/Hunt-Sleep</span><span class="invisible">ing-Beacons</span></a> <br>+ [offensive] <span class="h-card"><a href="https://infosec.exchange/@thefLinkk" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>thefLinkk</span></a></span> , (DeepSleep. A variant of Gargoyle for x64 to hide memory artifacts using ROP only and PIC) =&gt; <a href="https://github.com/thefLink/DeepSleep" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/thefLink/DeepSleep</span><span class="invisible"></span></a><br>+ [offensive] @frodosbon , (breakcyserver. Kill EDR Services) =&gt; <a href="https://github.com/waawaa/breakcyserver" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/waawaa/breakcyserve</span><span class="invisible">r</span></a><br>+ [offensive] <span class="h-card"><a href="https://infosec.exchange/@dr4k0nia" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>dr4k0nia</span></a></span> , (Origami is Packer compressing .net assemblies, (ab)using the PE format for data storage) =&gt; <a href="https://github.com/dr4k0nia/Origami" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/dr4k0nia/Origami</span><span class="invisible"></span></a><br>+ [offensive] <span class="h-card"><a href="https://infosec.exchange/@Flangvik" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Flangvik</span></a></span> , (SharpDllProxy. Retrieves exported functions from a legitimate DLL and generates a proxy DLL source code/template for DLL proxy loading or sideloading =&gt; <a href="https://github.com/Flangvik/SharpDllProxy" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">github.com/Flangvik/SharpDllPr</span><span class="invisible">oxy</span></a><br>+ [offensive] <span class="h-card"><a href="https://infosec.exchange/@Flangvik" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>Flangvik</span></a></span> , (NetLoader. Loads any C# binary in mem, patching AMSI/ETW) =&gt; <a href="https://github.com/Flangvik/NetLoader" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="">github.com/Flangvik/NetLoader</span><span class="invisible"></span></a></p>
Bishop Fox<p>Here's a look back at a list of 9 <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> tools we published: <a href="https://bishopfox.com/blog/9-red-team-tools" rel="nofollow noopener noreferrer" target="_blank"><span class="invisible">https://</span><span class="ellipsis">bishopfox.com/blog/9-red-team-</span><span class="invisible">tools</span></a> </p><p>Tools we highlighted for <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> engagements include: <br>- CursedChrome<br>- Universal Loader<br>- Sliver </p><p>If you have any <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> tool pics for future lists, let us know!</p>
Ben Heise<p>Hey folks here's my <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a>: I do <a href="https://infosec.exchange/tags/pentesting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>pentesting</span></a> <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a>, with a side of detection engineering/ <a href="https://infosec.exchange/tags/threathunting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>threathunting</span></a> /"purple teaming", and that's mostly what my feed is about. I boost news or related <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> things I find interesting and tend to follow folks generating that content. In between serious <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> stuff, I'll post/boost memes and funny content or photos of cute animals and fur buddies.</p>
Tom Eston :verified:<p>Hello! 👋 I believe an <a href="https://infosec.exchange/tags/introduction" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>introduction</span></a> is in order…</p><p>I’ve been in <a href="https://infosec.exchange/tags/infosec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>infosec</span></a> for over 17 years 😀</p><p>Most of my career has been in offensive security. I started out as a pentester and did a lot of <a href="https://infosec.exchange/tags/redteam" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteam</span></a> stuff (before <a href="https://infosec.exchange/tags/redteaming" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>redteaming</span></a> was red teaming), <a href="https://infosec.exchange/tags/physicalsecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>physicalsecurity</span></a>, <a href="https://infosec.exchange/tags/networksecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>networksecurity</span></a>, and was even a developer for a short period of time 😬. Got the <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> bug until I moved into management/leadership roles. But <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> is still my “technical” passion. I’m currently the AVP of Consulting at Bishop Fox where I lead several teams of super talented and amazing hackers! 🦊</p><p>While I was getting into pentesting, I did a bunch of research on the security and privacy of social networks right around the time social was in its infancy (circa 2008). Got to speak about that at a bunch of conferences back in the day which allowed me to meet some amazing people (including many of the OG <a href="https://infosec.exchange/tags/sectwits" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>sectwits</span></a>). That was around the time I also got into <a href="https://infosec.exchange/tags/podcasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcasting</span></a> and started the Social Media Security Podcast which later became <span class="h-card"><a href="https://infosec.exchange/@sharedsecurity" class="u-url mention" rel="nofollow noopener noreferrer" target="_blank">@<span>sharedsecurity</span></a></span>. I’ve been podcasting for over 13 years now!</p><p>I admit I was more of a lurker on the birdapp but mostly because I found real engagement difficult plus I wasn’t a fan of the toxicity (especially more recently). So far Mastodon feels very different and almost like the original birdapp before algorithms and the mess we see today.</p><p>Anyway, I’ll be tooting about <a href="https://infosec.exchange/tags/offensivesecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>offensivesecurity</span></a> <a href="https://infosec.exchange/tags/appsec" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>appsec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/privacy" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>privacy</span></a> <a href="https://infosec.exchange/tags/leadership" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>leadership</span></a> <a href="https://infosec.exchange/tags/careers" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>careers</span></a> <a href="https://infosec.exchange/tags/podcasting" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>podcasting</span></a> and probably <a href="https://infosec.exchange/tags/cats" class="mention hashtag" rel="nofollow noopener noreferrer" target="_blank">#<span>cats</span></a>. I happen to have 5 of them! 😺</p>