Defte_ Profile Banner
Aurélien Chalot Profile
Aurélien Chalot

@Defte_

Followers
3K
Following
3K
Statuses
1K

Hacker, sysadmin and security researcher @OrangeCyberdef 💻 Calisthenic enthousiast 💪 and wannabe philosopher https://t.co/SqDDhIGGGh 📖 🔥 Hide&Sec 🔥

The grid
Joined November 2017
Don't wanna be here? Send us removal request.
@Defte_
Aurélien Chalot
7 months
I have seen lot of stupid things lately concerning CS, EDR's and Windows drivers. I wrote a, not so bad I guess, long blog post explaining how to build a windows driver, why EDR's need them, and how EDR's work, might be helpful 🤪
6
158
497
@Defte_
Aurélien Chalot
11 hours
@hakluke Real!
0
0
0
@Defte_
Aurélien Chalot
24 hours
@rvrsh3ll Thanks mate ✌🏻✌🏻
0
0
2
@Defte_
Aurélien Chalot
1 day
@pr3izh3r Thanks dude I appreciate 😃
0
0
0
@Defte_
Aurélien Chalot
1 day
@SIMKRA202 Thank you!
0
0
0
@Defte_
Aurélien Chalot
1 day
@never_unsealed Of course but my point is that you can limit the things you trust. The probability that someone exploits a hypervisor vuln is much lower than a pentester running psexec exe on your system ✌🏻
0
0
3
@Defte_
Aurélien Chalot
1 day
@DaahtK Your welcome my man ✌🏻
0
0
0
@Defte_
Aurélien Chalot
1 day
can be found here and you will also find advanced ways of detecting PsExec.exe on your network in the blog post directly 🔥
1
14
72
@Defte_
Aurélien Chalot
6 days
RT @Wietze: 🚀 Today I'm launching ArgFuscator: an open-source platform documenting command-line obfuscation tricks AND letting you generate…
0
180
0
@Defte_
Aurélien Chalot
6 days
@Wietze Excellent!!
0
0
2
@Defte_
Aurélien Chalot
8 days
See you there 😎
@1ns0mn1h4ck
Insomni'hack
21 days
🚨 The Insomni’hack 2025 Conferences Programme is LIVE! 📅 2 days, top experts, & cutting-edge cybersecurity talks. Get your tickets now: #INSO25 #Cybersecurity #EthicalHacking #Switzerland
Tweet media one
0
0
2
@Defte_
Aurélien Chalot
17 days
@techspence But I'd say who cares ahah! As long as you can do your stuff, use PowerShell it doesn't matter!! I'm just using Python because I have learned that way :P
1
0
1
@Defte_
Aurélien Chalot
19 days
This dude omgggggg 🔥@SinSinology
@thezdi
Trend Zero Day Initiative
20 days
We'll just leave this here...
0
1
11
@Defte_
Aurélien Chalot
20 days
@_RastaMouse Isn't the first call used to retrieve the size of the buffer and the second one to actually get the info? I believe I had the same thing a while back
1
0
2
@Defte_
Aurélien Chalot
21 days
@SkelSec @_RastaMouse Internet remembers ahah but yeah, manipulating credentials is so overrated nowadays considering you can just run task as someone else 😴
0
0
0
@Defte_
Aurélien Chalot
30 days
@Ox00000000 👀🔥
0
0
1
@Defte_
Aurélien Chalot
2 months
RT @_zblurx: New module on #NetExec : wam Dump #Entra access tokens from Windows Token Broker Cache, and make your way to Entra 🚀 Thanks @…
0
162
0
@Defte_
Aurélien Chalot
2 months
@staatsgeheim Yeah makes sens! Thanks for the information tho!
1
0
2
@Defte_
Aurélien Chalot
2 months
@staatsgeheim Wtffffff, and do you obtain a full priv system token or a restricted one ?
1
0
3