Nick Britton(@nerbies) 's Twitter Profileg
Nick Britton

@nerbies

Penetration Testing Practice Development Lead @protiviti

ID:236111448

calendar_today09-01-2011 20:49:17

493 Tweets

236 Followers

448 Following

Maya Kaczorowski(@MayaKaczorowski) 's Twitter Profile Photo

Wrote some words on my recent experience with burnout.

I was burnt out. Everyone else is too. We're about to have a moment.
mayakaczorowski.com/blogs/burnout

account_circle
Ray [REDACTED](@RayRedacted) 's Twitter Profile Photo

The PancakesCon 2 videos for this year are available now at PancakesCon.org/videos.

Our A/V crew had a secret goal of releasing these within a week of the con. We hope you enjoy them as much as we do.

HUGE thx to Dustin (BusySignal), @c1ph0r, and Golgothus (Zach He/Him) for their work this week!

account_circle
randy@infosec.exchange - Stand with 🇺🇦(@rpargman) 's Twitter Profile Photo

PancakesCon 2 - Hunting Malware Beacons and Making Pizza from scratch — both easier than you might think: youtu.be/BoJKrpBFYYQ

account_circle
Griffin Payne(@GriffinPayne) 's Twitter Profile Photo

Huge shout out to Lesley Carhart and all the volunteers and helpers for organizing and running PancakesCon (Virtual Hacking Conference). I had a blast and enjoyed all the talks thoroughly. Well done everyone!

account_circle
randy@infosec.exchange - Stand with 🇺🇦(@rpargman) 's Twitter Profile Photo

Prepping pizza for my talk on PancakesCon (Virtual Hacking Conference) starting in just over an hour from now (7pm EDT). The votes were overwhelmingly for live demo, so I will be attempting to design threat hunting queries while baking a pizza simultaneously streaming live on pancakescon.org/track2

Prepping pizza for my talk on @PancakesCon starting in just over an hour from now (7pm EDT). The votes were overwhelmingly for live demo, so I will be attempting to design #KQL threat hunting queries while baking a pizza simultaneously streaming live on pancakescon.org/track2
account_circle
Nick Britton(@nerbies) 's Twitter Profile Photo

Honored to be selected to share two of my passions: breached credentials and bourbon!
We’re coming for your creds and we’re going to have some tasty drinks while we do it!

account_circle
BSidesDFW(@BSidesDFW) 's Twitter Profile Photo

'Managing Misfits: Lessons Learned from a decade leading a penetration testing team.' by Krissy Safi and Nick Britton

account_circle
Omar(@theweb3hacker) 's Twitter Profile Photo

Introducing GitDorker - My automated GitHub dorking tool with over 240+ dorks for easy bug bounty wins :)

s

Check out my blog post for more details!

medium.com/@obheda12/gitd…

Introducing GitDorker - My automated GitHub dorking tool with over 240+ dorks for easy bug bounty wins :) #HackerOne #infosec #Synack #bugcrowd #bugbountytips #bugbountytip #CyberSecurity #100DaysOfCode Check out my blog post for more details! medium.com/@obheda12/gitd…
account_circle
Microsoft Threat Intelligence(@MsftSecIntel) 's Twitter Profile Photo

Microsoft is actively tracking threat actor activity using exploits for the CVE-2020-1472 Netlogon EoP vulnerability, dubbed Zerologon. We have observed attacks where public exploits have been incorporated into attacker playbooks.

account_circle
Andy Gill(@ZephrFish) 's Twitter Profile Photo

The bug is going to be game over for a lot of companies and I reckon the weaponised payloads in ransomware will be pretty bad now; Destroy the DC by changing the password, get DA ransom the network and it's maximum pay day for criminals.

account_circle
Dominic Chell 👻(@domchell) 's Twitter Profile Photo

An interesting read, on Cobalt Strike detections. Plenty of takeaways for red teams looking to improve their tradecraft... One good point that we've been aware of for quite some time, work stageless or use a custom stager...

account_circle
Yuri Diogenes(@yuridiogenes) 's Twitter Profile Photo

Want to test out Microsoft products (and others) but don't have the environment to thoroughly test? Want to simulate Active Directory, privileged users, to learn more about credential exposure? Check it out this Defend the Flag environment
github.com/microsoft/Defe…

account_circle
Jean(@Jean_Maes_1994) 's Twitter Profile Photo

Hey y'all!
Ever used invoke-kerberoast or rubeus and tired of having to do kung fu to get the output completly hashcat/john compliant?

Ever had a mimikatz dump so big your eyes popped out?

Fear no more, I wrote parsers for both in python!
github.com/jfmaes/Parsers

account_circle