0x2E Cravaterouge | Retour sur bloodyAD, une philosophie, badsuccessor
Twitter: https://x.com/mpgn_x64 Twitter: https://x.com/rouge_cravate Github bloodyad https://github.com/CravateRouge/bloodyAD Blogpost: https://cravaterouge.com/articles/
Twitter: https://x.com/mpgn_x64 Twitter: https://x.com/rouge_cravate Github bloodyad https://github.com/CravateRouge/bloodyAD Blogpost: https://cravaterouge.com/articles/
Twitter: https://x.com/shadow_gatt Twitter: https://x.com/mpgn_x64 Talk lehack https://www.youtube.com/watch?v=7itLKu4f1XQ
Twitter: https://x.com/croco_byte Twitter: https://x.com/mpgn_x64 Blog post - https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx - https://www.synacktiv.com/publications/abusing-multicast-poisoning-for-pre-authenticated-kerberos-relay-over-http-with - https://www.synacktiv.com/publications/taking-the-relaying-capabilities-of-multicast-poisoning-to-the-next-level-tricking...
Twitter: https://x.com/hugow_vincent Twitter: https://x.com/mpgn_x64 Blog post https://www.synacktiv.com/publications/relaying-kerberos-over-smb-using-krbrelayx
Twitter: https://x.com/jmbesnard_maz Twitter: https://x.com/mpgn_x64 Adminer: https://github.com/Mazars-Tech/AD_Miner Bluesky: mpgn
Twitter: https://x.com/_worty Twitter: https://x.com/mpgn_x64 ECSC: https://ecsc.eu/ FCSC: https://cyber.gouv.fr/france-cybersecurity-challenge-2024 HeroCTF: https://x.com/HeroCTF
Twitter : https://x.com/_p0ly_ Twitter: https://x.com/vdehors Twitter: https://x.com/mpgn_x64
Secator: https://github.com/freelabz/secator Twitter: https://x.com/freelabz Twitter: https://x.com/mpgn_x64
Twitter: https://twitter.com/mxrchreborn Twitter: https://twitter.com/mpgn_x64 Ghunt : https://github.com/mxrch/GHunt
Twitter https://twitter.com/sar5430 blog: https://sar5430.github.io/ Twitter https://twitter.com/mpgn_x64 Site de crackme: https://crackmes.one/
Twitter https://twitter.com/nono_nonop Twitter https://twitter.com/mpgn_x64
Twitter fr0gger https://twitter.com/fr0gger_ Twitter https://twitter.com/mpgn_x64 Livre https://store.securitybreak.io/threatintel Unprotect.io https://unprotect.it/ https://unprotect.it/
Synacktiv: https://www.synacktiv.com/ mpgn: https://twitter.com/mpgn_x64
ringtail twitter: https://twitter.com/ringtail_sec ringtail site web: https://ringtail.ch/ basilisk: https://ringtail.ch/products/basilisk-zero-automatic-ethernet-ghosting mpgn: https://twitter.com/mpgn_x64 Merci à la société BZHunt pour le prêt du matos https://bzhunt.fr/...
Twitter: BitK: https://twitter.com/BitK_ Twitter Sakiir: https://twitter.com/sakiirsecurity Team CTFtime: https://ctftime.org/team/87434 mpgn: https://twitter.com/mpgn_x64
Twitter: https://twitter.com/_zblurx Github: https://github.com/zblurx mpgn: https://twitter.com/mpgn_x64
Twitter Agarri: https://twitter.com/Agarri_FR Formation Burp Suite: https://hackademy.agarri.fr/ Twitter MasteringBurp : https://twitter.com/MasteringBurp Blog Agarri : https://www.agarri.fr/fr mpgn: https://twitter.com/mpgn_x64...
palenath : https://twitter.com/palenath Github: https://github.com/megadose/ Site OSINT FR: https://osintfr.com/ Discord OSINT FR: https://discord.gg/dWY9sWFKYD Epios: https://epieos.com/ mpgn: https://twitter.com/mpgn_x64...
Blaklis_ : https://twitter.com/Blaklis_ Lien Club Paris Discord: https://discord.gg/MT6D8wP2Hd Profil HackerOne: https://hackerone.com/blaklis?type=user mpgn: https://twitter.com/mpgn_x64...
M4Fly: https://twitter.com/M4yFly GOAD: https://github.com/Orange-Cyberdefense/GOAD RCE GLPI: https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/ Arsenal: https://github.com/Orange-Cyberdefense/arsenal Mindmap AD: https://github.com/Orange-Cyberdefense/ocd-mindmaps mpgn: https://twitter.com/mpgn_x64...
g0h4n: https://twitter.com/g0h4n_0 RustHound: https://github.com/OPENCYBER-FR/RustHound SharpHound: https://github.com/BloodHoundAD/SharpHound Bloodhound: https://github.com/BloodHoundAD/BloodHound python-bloodhound: https://github.com/fox-it/BloodHound.py mpgn: https://twitter.com/mpgn_x64...
lesnuages / rkervell : https://twitter.com/rkervell Moloch : https://twitter.com/LittleJoeTables blogpost sliver : https://dominicbreuker.com/ Sliver: https://github.com/BishopFox/sliver mpgn: https://twitter.com/mpgn_x64...
mpgn: https://twitter.com/mpgn_x64 @pentest_swissky : https://twitter.com/pentest_swissky PayloadsAllTheThings https://github.com/swisskyrepo/PayloadsAllTheThings SSRFmap https://github.com/swisskyrepo/SSRFmap...
mpgn: https://twitter.com/mpgn_x64 @_ZakSec : https://twitter.com/_ZakSec tool: https://github.com/Z4kSec/Masky blog post: https://z4ksec.github.io/posts/masky-release-v0.0.3/ les coin cme: https://twitter.com/mpgn_x64/status/1537728466933714944?s=20&t=iq62ePRjV31FfNB8uk1x0w...
mpgn: https://twitter.com/mpgn_x64 @snyff: https://twitter.com/snyff PentesterLab : https://pentesterlab.com/
mpgn: https://twitter.com/mpgn_x64 @Th3_l5D: https://twitter.com/Th3_l5D NewbieContent : https://www.newbiecontest.org/
mpgn: https://twitter.com/mpgn_x64 @T00uF : https://twitter.com/T00uF github: https://github.com/login-securite/DonPAPI : Dumping revelant information on compromised targets without AV detection recherche @Fist0urs pour Synacktiv https://www.synacktiv.com/ressources/JSSI_2017_DPAPI_Synacktiv.pdf...
Solution du lab présenté lors du Workshop CrackMapExec à leHack 2022 par @mpgn_x64
mpgn: https://twitter.com/mpgn_x64 @swapgs: https://twitter.com/swapgs blog: https://swap.gs/
mpgn: https://twitter.com/mpgn_x64 the-useless-one (Yannick): https://github.com/the-useless-one pywerview: https://github.com/the-useless-one/pywerview @lowercase_drm (Simon) https://twitter.com/lowercase_drm Le blog de l'équipe : https://offsec.almond.consulting/...