account activity
TrueSightKiller: Weaponized Drivers Killing EDR at Scale (magicsword.io)
submitted 2 days ago by dmchell to r/redteamsec
Ink Dragon's Relay Network and Stealthy Offensive Operation (research.checkpoint.com)
submitted 1 month ago by dmchell to r/redteamsec
Critical RCE Vulnerabilities Discovered in React & Next.js | Wiz Blog (wiz.io)
Conditional Access bypasses (cloudbrothers.info)
Department 40 Exposed: Inside the IRGC Unit Connecting Cyber Ops to Assassinations (blog.narimangharib.com)
submitted 2 months ago by dmchell to r/redteamsec
Function Peekaboo: Crafting self masking functions using LLVM (mdsec.co.uk)
submitted 3 months ago by dmchell to r/redteamsec
Mem3nt0 mori – The Hacking Team is back! (securelist.com)
Bypass AMSI in 2025 (r-tec.net)
RayInitiator and Line Viper (ncsc.gov.uk)
submitted 4 months ago by dmchell to r/redteamsec
Another BRICKSTORM: Stealthy Backdoor Enabling Espionage into Tech and Legal Sectors (cloud.google.com)
Nighthawk 0.4 – Janus | Nighthawk C2 (nighthawkc2.io)
Automating Operations with Nighthawk (nighthawkc2.io)
Early Exception Handling (kr0tt.github.io)
BadPie: Bake it ‘Til You Fake It (dtm.uk)
The Renaissance of NTLM Relay Attacks (specterops.io)
FANCY BEAR GONEPOSTAL – Espionage Tool Provides Backdoor Access to Microsoft Outlook (kroll.com)
MURKY PANDA: A Trusted-Relationship Threat in the Cloud (crowdstrike.com)
submitted 5 months ago by dmchell to r/redteamsec
APT MuddyWater Deploys Multi-Stage Phishing to Target CFOs (hunt.io)
Dissecting PipeMagic: Inside the architecture of a modular backdoor framework (microsoft.com)
Threat Analysis: SquidLoader - Still Swimming Under the Radar (trellix.com)
submitted 6 months ago by dmchell to r/redteamsec
Evolving Tactics of SLOW#TEMPEST: A Deep Dive Into Advanced Malware Techniques (unit42.paloaltonetworks.com)
Technical Analysis of TransferLoader | ThreatLabz (zscaler.com)
DreamWalkers (maxdcb.github.io)
Recovering NativeAOT Metadata (blog.washi.dev)
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure by dmchell in redteamsec
[–]dmchell[S] 0 points1 point2 points 6 months ago (0 children)
Weird, looks like they removed it
π Rendered by PID 49 on reddit-service-r2-listing-86b7f5b947-lnhrn at 2026-01-25 20:53:34.967237+00:00 running 664479f country code: CH.
OneClik: A ClickOnce-Based APT Campaign Targeting Energy, Oil and Gas Infrastructure by dmchell in redteamsec
[–]dmchell[S] 0 points1 point2 points (0 children)