Transform LDAP filters, BaseDNs, attribute lists, and attribute entries using composable middleware chains. Zero dependencies. Works as a library or CLI tool.

https://github.com/j0hnZ3RA/ldapx-py

#infosec #cybersecurity #redteam #pentest #opensource

GitHub - j0hnZ3RA/ldapx-py: Transform LDAP filters, BaseDNs, attribute lists, and attribute entries using composable middleware chains. Zero dependencies. Works as a library or CLI tool.

Transform LDAP filters, BaseDNs, attribute lists, and attribute entries using composable middleware chains. Zero dependencies. Works as a library or CLI tool. - j0hnZ3RA/ldapx-py

GitHub

What is NetBIOS and SMB Exploitation Techniques: A Practical Guide

In this article, I cover key exploitation techniques, real-world attack scenarios, and how to secure these services effectively.

https://denizhalil.com/2026/01/15/netbios-smb-exploitation-techniques-guide/

#CyberSecurity #SMB #NetBIOS #NetworkSecurity #ActiveDirectory #RedTeam #BlueTeam #Pentesting #InfoSec #WindowsSecurity #EthicalHacking #ITSecurity #DenizHalil

Another talk announcement for BSides Luxembourg!

๐Ÿ”ฅ๐Ÿค– ๐—ข๐—› ๐—ฆ๐—›๐—œ๐—ง ๐—œ ๐—”๐—–๐—–๐—œ๐——๐—˜๐—ก๐—ง๐—”๐—Ÿ๐—Ÿ๐—ฌ ๐—•๐—ฅ๐—˜๐—”๐—–๐—›๐—˜๐—— ๐—”๐—ก ๐—ข๐—ฅ๐—š๐—”๐—ก๐—œ๐—ญ๐—”๐—ง๐—œ๐—ข๐—ก (๐—ข๐—ฅ ๐— ๐—”๐—ก๐—ฌ) ๐—จ๐—ฆ๐—œ๐—ก๐—š ๐—”๐—œ โ€“ Panagiotis Fiskilis ๐Ÿ’ฅ

What starts as a harmless search can spiral into a multi-organization data breachโ€”especially when AI gets involved.

This talk dives into real-world research showing how AI can be weaponized for OSINT, enabling large-scale data discovery, spear phishing campaigns, and even manipulation of AI systems themselves. From injecting malicious context into models to scaling attacks via APIs and agent workflows, this session explores how adversaries can turn AI into a powerful offensive toolโ€”and how defenders can detect and respond.

Expect a true purple team perspective, blending attacker techniques with defensive insights, including OPSEC considerations and strategies to identify malicious AI-driven activities before they escalate.

Panagiotis Fiskilis is a Senior Red Team Operator at NVISO, specializing in API hacking, Active Directory exploitation, and malware development. With multiple industry certifications (OSCP, OSWE, CRTO, eWPT and more), he brings hands-on offensive expertise combined with a strong research-driven mindset.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/
๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/
๐Ÿ‘‰ Browse sessions, track talks in real time, and plan your schedule on Hacker Tracker: https://hackertracker.app/schedule?conf=BSIDESLUX2026

#BSidesLuxembourg2026 #AISecurity #RedTeam #OSINT #CyberSecurity #AI #ThreatIntelligence #PurpleTeam

What is SNMP Security and Exploitation: A Comprehensive Guide

In this article, I cover how SNMP exploitation works, common vulnerabilities, and how to properly secure it.
https://denizhalil.com/2026/01/21/snmp-security-exploitation-guide

#CyberSecurity #SNMP #NetworkSecurity #InfoSec #InfrastructureSecurity #BlueTeam #RedTeam #Pentesting #ITSecurity #SecurityEngineering #DenizHalil

What is Web Cache Poisoning Attack and Defense: A Comprehensive Guide

In this article, I explain how the attack works, common vectors, and practical prevention technique
https://denizhalil.com/2026/01/26/web-cache-poisoning-attacks-prevention-guide/

#CyberSecurity #WebSecurity #CachePoisoning #AppSec #OWASP #InfoSec #Pentesting #RedTeam #BlueTeam #HTTP

๐Ÿ”ฅ Just Announced: Another Must-See Session at BSides Luxembourg!

๐Ÿค–๐Ÿ’ฅ ๐—ง๐—›๐—˜ ๐—”๐—š๐—˜๐—ก๐—ง๐—ฆ ๐—ข๐—™ ๐—–๐—›๐—”๐—ข๐—ฆ: ๐—”๐—œ ๐——๐—ฅ๐—œ๐—ฉ๐—˜๐—ก ๐— ๐—”๐—Ÿ๐—ช๐—”๐—ฅ๐—˜ ๐—š๐—˜๐—ก๐—˜๐—ฅ๐—”๐—ง๐—œ๐—ข๐—ก โ€“ Arad Donenfeld โš™๏ธ๐Ÿ”ฅ

What happens when AI doesnโ€™t just assist malware developmentโ€”but fully owns it?

This talk explores a system where AI agents autonomously generate malware from start to finish. From prompt engineering and model orchestration to automated build-and-fix loops, it reveals how AI can produce diverse, evasive malware samples that challenge traditional detection. As models evolve, so does the scale, speed, and unpredictability of offensive tooling.

Arad Donenfeld is an attacks and exploits developer at SafeBreach with a strong background in security research, malware development, and offensive tooling. His work focuses on building and testing real-world attack techniques to improve detection and defense strategies.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/

๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #AISecurity #Malware #RedTeam #CyberSecurity #AI #ThreatResearch

awesome-bof search

SSH Tunneling and Port Forwarding Techniques: A Comprehensive Guide

In this article, I cover:
* How SSH tunneling works under the hood
* Local, remote, and dynamic port forwarding techniques
* Real-world use cases (databases, internal services, pivoting)
* Security risks and hardening recommendations

https://denizhalil.com/2026/02/02/ssh-tunneling-port-forwarding-guide/

#CyberSecurity #sshtunneling #portforwarding #NetworkSecurity #Linux #RedTeam #BlueTeam #Pentesting #InfoSec #securityengineering #EthicalHacking #ITSecurity

Another talk announcement for BSides Luxembourg!

๐Ÿค–๐Ÿ” ๐—”๐—œ ๐—”๐—ก๐—— ๐—–๐—ฅ๐—ฌ๐—ฃ๐—ง๐—ข๐—š๐—ฅ๐—”๐—ฃ๐—›๐—ฌ ๐—™๐—ข๐—ฅ ๐—˜๐—ฉ๐—”๐—ฆ๐—œ๐—ฉ๐—˜ ๐— ๐—”๐—Ÿ๐—ช๐—”๐—ฅ๐—˜ โ€“ zhassulan zhussupov aka @cocomelonckz ๐Ÿงฌ๐Ÿ”ฅ

Modern malware doesnโ€™t just hideโ€”it adapts.

This talk explores how AI and advanced cryptography are reshaping offensive tradecraft, enabling malware to rewrite itself, adapt to environments, and evade behavioral detection. From polymorphic code to stealthy encryption techniques, this is the next evolution of โ€œthinkingโ€ malware.

zhassulan zhussupov aka @cocomelonckz is a cybersecurity researcher, author, and speaker known for deep expertise in malware development, reverse engineering, and offensive security, with multiple published works and global conference talks.

๐Ÿ“… Conference Dates: 6โ€“8 May 2026 | 09:00โ€“18:00
๐Ÿ“ 14, Porte de France, Esch-sur-Alzette, Luxembourg
๐ŸŽŸ๏ธ Tickets: https://2026.bsides.lu/tickets/

๐Ÿ“… Schedule Link: https://pretalx.com/bsidesluxembourg-2026/schedule/

#BSidesLuxembourg2026 #AISecurity #Malware #Cryptography #RedTeam #CyberSecurity

Weaponize signed .NET ClickOnce applications for initial access by hijacking a dependency DLL via AppDomainManager injection and loading a C# port of ProxyBlob Agent.

https://github.com/dazzyddos/ClickOnceBlobber

#infosec #cybersecurity #redteam #pentest