![WHOAMI Profile](https://pbs.twimg.com/profile_images/1510652008876765184/SYw59ZdF_x96.jpg)
WHOAMI
@wh0amitz
Followers
582
Following
50
Statuses
152
Red Team / Offensive Security, Cameo in @StrawHat_CTF for pentest. Web Security / Windows / Active Directory / Post Exploitation
Beijing
Joined February 2022
SharpADWS is an Active Directory Recon and Exploit tool for Red Teams via the ADWS protocol, Inspired by @FalconForceTeam Without the LDAP protocol, it can easily bypass most traffic monitoring for LDAP #BloodHound #redteam #Pentesting #CyberSecurity
1
145
346
RT @decoder_it: M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx A Kerberos relay & forwarder for MiTM…
0
233
0
RT @decoder_it: Relaying DCOM has always intrigued me, so I decided to dive in. Started with a MiTM attack using a fake DNS entry, targetin…
0
40
0
RT @tiraniddo: It seems amazing to me that MS have spent years talking about this feature and have not fixed well known public bypasses. My…
0
70
0
RT @MalDevAcademy: New Module 46: Exploiting EDRs For Evasion - Preventing EDR From Taking Action This module demonstrates a logic vulne…
0
37
0
RT @h4wkst3r: NEW release (v1.3) of ADOKit is out NOW which includes 7 new modules from @NicolasHeiniger and myself, among other fixes/impr…
0
16
0
RT @snovvcrash: Implementing a session manager is a tons of fun… and pain 😅 Have learned so much about CreateProcess and Logon APIs studyin…
0
8
0
RT @EricaZelic: Oldy but goody from one of my favorite researchers, itm4n, about DLL proxying and privilege escalation from implmentations…
0
40
0
RT @stephenfewer: We have a (draft) @metasploit exploit module in the queue for CVE-2024-4577, the new PHP CGI argument injection vuln disc…
0
89
0
An interesting SSRF fix bypass (CVE-2024-4084) in AnythingLLM that I found a few months ago has been made public. #llm #Pentesting #CyberSecurity #BugBounty
CVE-2024-4084 A Server-Side Request Forgery (SSRF) vulnerability exists in the latest version of mintplex-labs/anything-llm, allowing attackers to bypass the official fix intended to…
0
0
3
RT @decoder_it: As expected, NTLM is now "deprecated." @splinter_code Was wondering what would have happened if we…
0
15
0
RT @filip_dragovic: So MSRC first say that they cannot reproduce ,now say that no security boundary is crossed. Tested this on few differen…
0
110
0
RT @decoder_it: I created another variant of our so-loved *potato family, the #FakePotato. But have to wait MSRC response before disclosing…
0
11
0