![Christopher Panayi Profile](https://pbs.twimg.com/profile_images/619854928358547456/JbV9K_uM_x96.jpg)
Christopher Panayi
@Raiona_ZA
Followers
458
Following
11K
Statuses
4K
CRO @ MWR CyberSec (@MWRCyberSec)
South Africa
Joined July 2014
@_xpn_ @0xcsandker I've always wanted to be able to do this over a Beacon... Keen to play with it! Thanks Adam :D
1
0
2
RT @_xpn_: New tool published which is proving to be useful. Cred1py allows execution of the CRED-1 SCCM attack published by @Raiona_ZA ove…
0
162
0
RT @lauriewired: Amateurs obsess over tools, pros over mastery. It's an easy trap to fall into. I'm asked constantly: "what's the best de…
0
133
0
RT @_markel___: Intel HW is too complex to be absolutely secure! After years of research we finally extracted Intel SGX Fuse Key0, AKA Root…
0
1K
0
RT @asymmetric_re: New blog post: Evmos Precompile State Commit Infinite Mint. A critical vulnerability in EVM state commits during precom…
0
19
0
RT @orange_8361: Thrilled to release my latest research on Apache HTTP Server, revealing several architectural issues!
0
662
0
RT @taviso: This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags thou…
0
3K
0
RT @_Mayyhem: Check out this blog from Marshall Price @GuidePointSec with detailed instructions for post-takeover remote code execution on…
0
13
0
RT @NathanMcNulty: I am so excited to see this announced! This solution brings Conditional Access to Kerberos authentication, which means…
0
101
0
RT @realhashbreaker: Here is a 72-byte alphanum MD5 collision with 1-byte difference for fun: md5("TEXTCOLLBYfGiJUETHQ4hAcKSMd5zYpgqf1YRDh…
0
2K
0
RT @SquidgeRugby: One week ago, Siya Kolisi's immortals became just the second side to ever retain the Rugby World Cup. So, how did they do…
0
313
0
RT @HTTP418InfoSec: These attacks are from tooling and guides shared by @_Mayyhem, @garrfoster, @_xpn_, @Raiona_ZA and @DiLomSec1. @vendet…
0
3
0
RT @HTTP418InfoSec: I have just written a post ( summarising the various published SCCM attacks, from PXE enumerati…
0
36
0
@theluemmel Thanks for the shout out :) I would expect that the tool would better on Windows thanks to the crypto libraries I'm using, but strange that option 5 would bail on Linux; pretty sure I first developed that code on Linux 😅; will put it on the list of things I need to check out...
0
0
2
RT @theluemmel: Another quick tip for your next SCCM pentest with @Raiona_ZA's use it on a Windows box. It failed…
0
25
0
RT @BHinfoSecurity: Hey folks! In this 1-hour, Black Hills Information Security (BHIS) webcast, Gabriel Prudhomme will cover various SCCM…
0
59
0
First of a series we are starting looking at the anatomy of consent phishing attacks in the wild; have a look here if you are interested in finding out more :)
Phishing attacks are ubiquitous in modern times and take different forms depending on the objective that the attacker has. In this blogpost, Jonathon Everatt explores investigates a newer type of phishing, Consent Phishing. Take a read here:
0
1
3