PyroTek3 Profile Banner
Sean Metcalf Profile
Sean Metcalf

@PyroTek3

Followers
35K
Following
42K
Statuses
21K

Microsoft Certified Master #ActiveDirectory & former Microsoft MVP. Founder/CTO @TrimarcSecurity. He/Him. Work requests:https://t.co/VRrL9cUKFv #BLM

4°08'15.0N 162°03'42.0E
Joined August 2014
Don't wanna be here? Send us removal request.
@PyroTek3
Sean Metcalf
5 years
To my black family, friends, and people seeing this: I love you You matter I'm here for you #BlackLivesMatter
4
3
120
@PyroTek3
Sean Metcalf
3 days
RT @MalwareJake: At @WWHackinFest I'm watching @PyroTek3 rocking it in his Entra ID talk. This stuff on the slides is table stakes. https:/…
0
12
0
@PyroTek3
Sean Metcalf
4 days
RT @techspence: 💡Things pentesters know but defenders may not: There are numerous windows protocols that are "coercible", meaning you can t…
0
10
0
@PyroTek3
Sean Metcalf
4 days
RT @merill: ✳️ Quick heads up. Microsoft just dropped a bunch of new least privilege Graph permissions. Avoid granting super privileges l…
0
58
0
@PyroTek3
Sean Metcalf
4 days
RT @NathanMcNulty: Reminder - Microsoft publishes some really nice communication templates for helping you roll out things like MFA, SSPR,…
0
102
0
@PyroTek3
Sean Metcalf
4 days
RT @EricaZelic: Protect yourself from people like me: require you Global Admins (not Break Glass accounts) to require another Admin's appro…
0
7
0
@PyroTek3
Sean Metcalf
4 days
RT @ITguySoCal: TL;DR 1) Enable Windows Firewall to prevent lateral movement 2) Enable packet logging for future forensics 3) disable loc…
0
84
0
@PyroTek3
Sean Metcalf
5 days
RT @cglyer: I was talking to a CISO the other day and he mentioned that when his org implemented MFA with the MSFT authenticator app it red…
0
38
0
@PyroTek3
Sean Metcalf
5 days
RT @PhillipWylie: My role was eliminated, and I'm in search of a new job.
0
151
0
@PyroTek3
Sean Metcalf
12 days
RT @dakacki: I first met @Evil_Mog about 8 years ago. Coulda been @DerbyCon, maybe @defcon. Whatever, only thing that matters is that I’ve…
0
13
0
@PyroTek3
Sean Metcalf
13 days
I am speaking about Entra ID (Azure AD) Attack & Defense at Wild West Hackin' Fest in Denver next week!
Tweet media one
2
2
31
@PyroTek3
Sean Metcalf
14 days
RT @cryps1s: This is such a good read. The security team really did a wonderful job of building a robust and highly secure software supply…
0
8
0
@PyroTek3
Sean Metcalf
14 days
RT @BSidesCharm: The BSidesCharm call for volunteers is now open! If you are interested in volunteering for one of the largest BSides conf…
0
4
0
@PyroTek3
Sean Metcalf
14 days
RT @mthcht: LOLC2 - a collection of C2 projects that operate exclusively through legitimate services, I'm probably missing some projects le…
0
92
0
@PyroTek3
Sean Metcalf
15 days
RT @BlackInCyberCo1: Secure your spot today! 🎟️ General Admission tickets are on sale now—don’t miss out!⁠ ⁠ Tickets:
0
1
0
@PyroTek3
Sean Metcalf
18 days
RT @NathanMcNulty: Message delivery restrictions is a really awesome capability that many aren't aware of If you have mailboxes that only…
0
32
0
@PyroTek3
Sean Metcalf
20 days
RT @capitalweather: Tonight, we’re expecting wind chills near 0. Gifts for the Homeless, which CWG has supported for nearly a decade, is…
0
58
0
@PyroTek3
Sean Metcalf
20 days
RT @joevest: I'm excited to celebrate the five-year anniversary of the release of our book on building and running a red team! While the bo…
0
30
0
@PyroTek3
Sean Metcalf
20 days
RT @HackingDave: Smart phish via github - email comes from github - issue is created on repo that suspicious activity was detected and to c…
0
142
0
@PyroTek3
Sean Metcalf
20 days
RT @techspence: I'm not sure who put this site together, but this PingCastle cheat sheet is awesome. If you're a PingCastle fan, definitely…
0
89
0
@PyroTek3
Sean Metcalf
20 days
RT @techspence: I really appreciate these resources that CISA helps develop and share. Believe it or not there are IT folks out there who…
0
10
0