r1cksec

Data breach revealed,
Malware lurks, silent, stealthy -
OSINT tracks the thread.

2025-12-08

Harden Windows Safely, Securely using Official Supported Microsoft methods and proper explanation🕵️‍♂️

github.com/HotCakeX/Harden-Win

#infosec #cybersecurity #windows

2025-12-05

A post about how North Korean infiltration operation aimed at deploying remote IT workers across different companies in the American financial and crypto/Web3 sectors🕵️‍♂️

any.run/cybersecurity-blog/laz

#infosec #cybersecurity #threatintel

2025-12-04

A good post about different conditional access bypasses for Microsoft Entra🕵️‍♂️

cloudbrothers.info/en/conditio

#infosec #cybersecurity #redteam #pentest #cloud #entra #azure

2025-12-03

An article describing how it was possible to uncover the identity of an administrator of the Scattered Lapsus$ Hunters group🕵️‍♂️

krebsonsecurity.com/2025/11/me

#infosec #cybersecurity #threatintel #osint

2025-12-02

How to extract access tokens from Office desktop applications like Microsoft Teams🕵️‍♂️

blog.randorisec.fr/ms-teams-ac

#infosec #cybersecurity #pentest #redteam #azure #cloud

2025-12-01

Example code on how to use a custom dll during dll hijack on Narrator.exe as a persistence. The dll hijack is for %windir%\system32\speech_onecore\engines\tts\msttsloc_onecoreenus.dll🕵️‍♂️

github.com/api0cradle/Narrator

#infosec #cybersecurity #pentest #redteam #windows #persistence

2025-11-29

A Python reconnaissance tool designed to discover Azure services and attribute tenant ownership information based on their responses🕵️‍♂️

github.com/NetSPI/ATEAM

#infosec #cybersecurity #redteam #pentest #osint #opensource #cloud #azure

2025-11-29

@rosabelini You have to click "save" to store the results.

2025-11-28

How Watchtowr was able to collect credentials from jsonformatter.org and codebeautify.org🕵️‍♂️

labs.watchtowr.com/stop-puttin

#infosec #cybersecurity #osint #redteam #pentest

2025-11-26

A post about a CVE found in the Sliver Command and Control Framework (insecure default WireGuard policy)🕵️‍♂️

hngnh.com/posts/Sliver-CVE-202

#infosec #cybersecurity #redteam #pentest #cve

2025-11-25

Extract SAM and SYSTEM using Volume Shadow Copy (VSS) API. With multiple exfiltration options and XOR obfuscation🕵️‍♂️

github.com/ricardojoserf/SAMDu

#infosec #cybersecurity #redteam #pentest #windows

2025-11-24

A blogpost about the different types of components involved in COM/DCOM and their identifiers🕵️‍♂️

synacktiv.com/en/publications/

#infosec #cybersecurity #redteam #pentest #windows

2025-11-22

A BOF implementation of various registry persistence methods🕵️‍♂️

github.com/leftp/RegPersist

#infosec #cybersecurity #redteam #pentest #windows #opensource

2025-11-21

A blogpost about how site-based ACL attack vectors can lead to the compromise of one or several domains in an Active Directory environment🕵️‍♂️

synacktiv.com/en/publications/

#infosec #cybersecurity #pentest #redteam #activedirectory

2025-11-16

IP Rotation from different providers - Like FireProx but for GCP, Azure, Alibaba and CloudFlare🕵️‍♂️

github.com/ZephrFish/OmniProx

#infosec #cybersecurity #pentest #redteam

2025-11-14

A tool to play with scheduled tasks on Windows, in Rust🕵️‍♂️

github.com/BlWasp/PhantomTask

#infosec #cybersecurity #pentest #redteam #windows #opensource

2025-11-13

A python tool to map the access rights of network shares into a BloodHound OpenGraphs easily🕵️‍♂️

github.com/p0dalirius/ShareHou

#infosec #cybersecurity #redteam #pentest #opensource

2025-11-11

This project is a deliberately vulnerable environment to learn about LLM-specific risks based on the OWASP Top 10 for LLM Applications🕵️‍♂️

github.com/SECFORCE/LLMGoat

#infosec #cybersecurity #pentest #redteam #llm #ai #opensource

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst