michael_eder_ Profile Banner
Michael Eder @edermi@infosec.exchange Profile
Michael Eder @[email protected]

@michael_eder_

Followers
949
Following
3K
Statuses
5K

aka edermi

Munich
Joined July 2014
Don't wanna be here? Send us removal request.
@michael_eder_
Michael Eder @[email protected]
1 month
NFS has not received much attention of the offensive security community in nearly a decade. Today, we are happy to share our research on the topic: I'll give you a short overview in this thread šŸ§µ (1/5) #redteam #pentest
5
50
125
@michael_eder_
Michael Eder @[email protected]
2 hours
RT @podalirius_: šŸš€ New Tool Release: DescribeNTSecurityDescriptor šŸš€ Analyzing Windows NT Security Descriptors can be a headache. I builtā€¦
0
7
0
@michael_eder_
Michael Eder @[email protected]
2 days
RT @0xBoku: šŸ”ŖOpen-sourcing šŸ’€StringReaper BOF! I've had great success in engagements carving credentials out of remote process memory withā€¦
0
87
0
@michael_eder_
Michael Eder @[email protected]
2 days
RT @Oddvarmoe: Not sure if this is useful but created a script to dump certificate template information to a text file from an ADExplorer dā€¦
0
46
0
@michael_eder_
Michael Eder @[email protected]
2 days
RT @0x64616e: NTLM Relaying with DCOM cross-session activation over an external OXID resolver. This variant has the advantage over regularā€¦
0
73
0
@michael_eder_
Michael Eder @[email protected]
4 days
RT @SkelSec: @lpha3ch0 @techspence @michael_eder_ AI Agent finds secrets on fileshares. Launches scan (after parametrization), waits for sā€¦
0
3
0
@michael_eder_
Michael Eder @[email protected]
5 days
@SkelSec HTTP services. All appliances and hardware stuff, IP cameras, power supply, tomcat,... Everything having a web interface
0
0
1
@michael_eder_
Michael Eder @[email protected]
5 days
@SkelSec Find default login credentials to $screenshot
1
0
0
@michael_eder_
Michael Eder @[email protected]
5 days
RT @SpecterOps: Introducing Forge šŸ”„ ā€“ the first ā€œCommand Augmentationā€ container for Mythic! Check out @its_a_feature_'s latest blog postā€¦
0
26
0
@michael_eder_
Michael Eder @[email protected]
6 days
RT @SkelSec: Dabbling in AI agents recently. Using @huggingface 's smolagent module and the result was quite surprising. Below a video of mā€¦
0
7
0
@michael_eder_
Michael Eder @[email protected]
6 days
RT @AirbusSecLab: Weā€™re glad to announce we released Soxy!šŸš€ A Rust-powered suite of services for Citrix, VMware Horizon & Windows RDP. Redā€¦
0
55
0
@michael_eder_
Michael Eder @[email protected]
7 days
RT @RedTeamPT: šŸ„³ pretender has just passed 1000 GitHub starsā­ļø What better way to celebrate than releasing a big update with new features aā€¦
0
16
0
@michael_eder_
Michael Eder @[email protected]
7 days
RT @RedTeamPT: The LLMNR response name spoofing pioneered by @tiraniddo and @Synacktiv does not seem to work with mDNS & NetBIOS šŸ˜¢ But guesā€¦
0
73
0
@michael_eder_
Michael Eder @[email protected]
8 days
RT @ADAllTheTime: Delegated Managed Service Accounts (dMSA) are new in Server 2025 and solve a really important problem... We can migrateā€¦
0
84
0
@michael_eder_
Michael Eder @[email protected]
11 days
RT @OtterHacker: If the first thing you do when you compromise a MSSQL server is to check for xp_cmdshell, you might want to read this...ā€¦
0
65
0
@michael_eder_
Michael Eder @[email protected]
28 days
RT @mpgn_x64: imo way to complicated to extract the ntds, once you got a user with backup privilege group just do: 1āƒ£ nxc smb dc -u userā€¦
0
95
0
@michael_eder_
Michael Eder @[email protected]
30 days
@OtterHacker @zux0x3a How far have you been able to go with the sleep to keep impacked for example happy?
0
0
1
@michael_eder_
Michael Eder @[email protected]
1 month
@mcohmi @SkelSec @ly4k_ We wanted to make it public but getting stuff polished always fell short and we also wanted to do some testing first. I'll try to revive the efforts if there's actual interest, it definitely works šŸ˜…
0
0
5
@michael_eder_
Michael Eder @[email protected]
1 month
RT @mcohmi: Red team/pentest tools gotta stop using ldap3 and start using msldap from @SkelSec
0
30
0