wh0amitz Profile Banner
WHOAMI Profile
WHOAMI

@wh0amitz

Followers
582
Following
50
Statuses
152

Red Team / Offensive Security, Cameo in @StrawHat_CTF for pentest. Web Security / Windows / Active Directory / Post Exploitation

Beijing
Joined February 2022
Don't wanna be here? Send us removal request.
@wh0amitz
WHOAMI
1 year
SharpADWS is an Active Directory Recon and Exploit tool for Red Teams via the ADWS protocol, Inspired by @FalconForceTeam Without the LDAP protocol, it can easily bypass most traffic monitoring for LDAP #BloodHound #redteam #Pentesting #CyberSecurity
1
145
346
@wh0amitz
WHOAMI
3 months
RT @decoder_it: M'm glad to release the tool I have been working hard on the last month: #KrbRelayEx A Kerberos relay & forwarder for MiTM…
0
233
0
@wh0amitz
WHOAMI
3 months
RT @decoder_it: Relaying DCOM has always intrigued me, so I decided to dive in. Started with a MiTM attack using a fake DNS entry, targetin…
0
40
0
@wh0amitz
WHOAMI
3 months
Sleepy🥱
0
0
0
@wh0amitz
WHOAMI
4 months
RT @tiraniddo: It seems amazing to me that MS have spent years talking about this feature and have not fixed well known public bypasses. My…
0
70
0
@wh0amitz
WHOAMI
6 months
RT @CyberWarship: ''New Windows Backdoor BITSLOTH Exploits BITS for Stealthy Communication'' #infosec #pentest #redteam #blueteam https://…
0
3
0
@wh0amitz
WHOAMI
6 months
RT @MalDevAcademy: New Module 46: Exploiting EDRs For Evasion - Preventing EDR From Taking Action This module demonstrates a logic vulne…
0
37
0
@wh0amitz
WHOAMI
6 months
RT @h4wkst3r: NEW release (v1.3) of ADOKit is out NOW which includes 7 new modules from @NicolasHeiniger and myself, among other fixes/impr…
0
16
0
@wh0amitz
WHOAMI
6 months
RT @zyn3rgy: [Tool & Blog release] - smbtakeover, a technique to unbind/rebind port 445 without loading a driver, loading a module into LSA…
0
116
0
@wh0amitz
WHOAMI
6 months
RT @snovvcrash: Implementing a session manager is a tons of fun… and pain 😅 Have learned so much about CreateProcess and Logon APIs studyin…
0
8
0
@wh0amitz
WHOAMI
7 months
RT @EricaZelic: Oldy but goody from one of my favorite researchers, itm4n, about DLL proxying and privilege escalation from implmentations…
0
40
0
@wh0amitz
WHOAMI
8 months
RT @CyberWarship: ''CcmPwn: leverages the CcmExec service to remotely hijack user sessions'' #infosec #pentest #redteam #blueteam https://…
0
46
0
@wh0amitz
WHOAMI
8 months
RT @stephenfewer: We have a (draft) @metasploit exploit module in the queue for CVE-2024-4577, the new PHP CGI argument injection vuln disc…
0
89
0
@wh0amitz
WHOAMI
8 months
An interesting SSRF fix bypass (CVE-2024-4084) in AnythingLLM that I found a few months ago has been made public. #llm #Pentesting #CyberSecurity #BugBounty
@CVEnew
CVE
8 months
CVE-2024-4084 A Server-Side Request Forgery (SSRF) vulnerability exists in the latest version of mintplex-labs/anything-llm, allowing attackers to bypass the official fix intended to…
0
0
3
@wh0amitz
WHOAMI
8 months
RT @decoder_it: As expected, NTLM is now "deprecated." @splinter_code Was wondering what would have happened if we…
0
15
0
@wh0amitz
WHOAMI
9 months
RT @decoder_it: Just published a short blog post on abusing the SeRelabelPrivilege ;)
0
86
0
@wh0amitz
WHOAMI
10 months
RT @Flangvik: SharpCollection and IronSharpPack
0
18
0
@wh0amitz
WHOAMI
10 months
RT @naksyn: One thing I always look for when starting in a network without AD creds is user enumeration with RPC null sessions. impacket S…
0
55
0
@wh0amitz
WHOAMI
10 months
RT @tifkin_: ADCS strikes again (sounds a lot like ESC1). Just as a reminder, despite our recommendation of alerting IT administrators of t…
0
57
0
@wh0amitz
WHOAMI
11 months
RT @filip_dragovic: So MSRC first say that they cannot reproduce ,now say that no security boundary is crossed. Tested this on few differen…
0
110
0
@wh0amitz
WHOAMI
11 months
RT @decoder_it: I created another variant of our so-loved *potato family, the #FakePotato. But have to wait MSRC response before disclosing…
0
11
0