- 📖 I’m currently working on threat hunting
- 📘 I’m currently learning everything 🤣
- 🎭 I’m looking to explore purple teaming
- ☑️ 2025 Goals: learn more about Azure, KQL
- Maverick .NET Agent Analysis and WhatsApp PowerShell Worm (Stream - 21/10/2025)
- Full Red Team Engagement - Game of Active Directory (public)
- Reverse Malware in 12 Minutes (Ghidra + REMnux)
- Top FOUR Malwares in 2025: Full Analysis with ANY.RUN
- Dropping Creds With WSASS to Bypass PPL
- 6.pdf
- Triaging Obfuscated Binaries with Binary Ninja and AssemblyLine (Stream - 26/08/2025)
- Certipy Deep Dive — Escalating via AD CS with ESC4–ESC7
- BloodHound CE Tutorial: Find Active Directory Attacks Like a Red Teamer
- Triaging Malware with Malcat (Stream - 29/07/2025)
- cowbe0x004 starred CVE-2025-33053-Proof-Of-Concept
- cowbe0x004 starred JS-Tap
- cowbe0x004 starred byor
- cowbe0x004 starred iam-lens
- cowbe0x004 starred Black-Hat-Zig
- cowbe0x004 starred auditor.codes
- cowbe0x004 starred caracal
- cowbe0x004 starred Worms
- cowbe0x004 starred droidground
- cowbe0x004 starred Incident-Response-Powershell
- AC-Hunte is a network threat hunting tool that analyzes network traffic to detect which internal systems have...
- Reposted: Microsoft's legal team seizes 256 domains used by the ONNX phishing service blogs.microsoft.com/on-t...
- Reposted: Obfuscating API Patches to Bypass New Windows Defender Behavior Signatures
- Reposted: Check out this new AMSI bypass released with SpectersInsight 4.0.0! This technique enables loading o...
- Reposted: Tools Cloud Auditing Tool - github.com/nccgroup/ScoutSuite Post-Exploitation toolset github.com/daft...
- RT Devansh (⚡, 🥷): If you, like many, think relying just on
catcommand's output is enough to be sure about the integrity of a bash file. Think ... - RT Alh4zr3d: Red Teamers: Windows Subsystem for Linux (WSL) is more and more common, especially on dev workstations. Don't neglect it! WSL rev shell: ...
- RT Grzegorz Tworek: Need an almost invisible, post-exploitation, persistent, fileless, LPE backdoor? There are many, but this one looks really beautif...
- RT Mr. Rc: Are you interested in learning reverse engineering in 2023? I've spent the this year studying RE, and I want to share all the resources tha...
- RT Oliver Lyak: Today we're publishing new techniques for recovering NTLM hashes from encrypted credentials protected by Windows Defender Credential G...