![Daniel Profile](https://pbs.twimg.com/profile_images/1435585171013738498/T-96IOUB_x96.jpg)
Daniel
@0x64616e
Followers
1K
Following
91
Statuses
1K
Bsky: https://t.co/leaxW0jFOJ To the monsters we're the monsters.
Germany
Joined September 2021
RT @podalirius_: 🚀 New Tool Release: DescribeNTSecurityDescriptor 🚀 Analyzing Windows NT Security Descriptors can be a headache. I built…
0
7
0
RT @EricaZelic: Something to keep in mind This is also why when you allow your admins to PIM, they should be educated to deactivate their…
0
4
0
RT @0xdf_: MagicGardens from @hackthebox_eu has a ton in it! There's a bank trick and XSS via QRcode. There's a buffer overflow via large I…
0
20
0
RT @sixtyvividtails: Is your EDR a dump? Yes it is! cmd /v/c "set R=reg add HKLM\SYSTEM\CurrentControlSet\Control\CrashControl /f /v&!R! C…
0
85
0
RT @_logangoins: Introducing Stifle! A super simple .NET tool I spun up these past few days for abusing explicit strong certificate mapping…
0
77
0
RT @eversinc33: .@0xBoku recent unhooking bof reminded of this fun trick on how to unhook any windows DLL without opening a handle to an on…
0
31
0
@mjc91295814 Correct. SAM dump on a DC makes no sense either :D In a real scenario it would've been srv01 or something.
1
0
1
RT @Oddvarmoe: Not sure if this is useful but created a script to dump certificate template information to a text file from an ADExplorer d…
0
46
0
RT @sarperavci: Just launched CTF Search with 24k+ CTF writeups, covering everything from web exploitation to reverse engineering. Check it…
0
309
0
RT @codex_tf2: Back when I was writing WindowSpy I was messing around with capturing specific minimized PID windows, but never pushed that…
0
20
0