506 Followers
12 Following
191 Posts
Creators of BloodHound | Experts in Adversary Tradecraft | Leaders in Identity Attack Path Management
Websitehttps://specterops.io/
Twitterhttps://twitter.com/specterops
Bloghttps://posts.specterops.io/

Attackers don’t exploit tools—they exploit identities. Learn how to defend where it matters. Join operators and defenders for one of our hands-on training courses at #SOCON2026.

In-person attendees also receive a free conference pass. Save your spot ➡️ https://ghst.ly/socon-2026

See your network shares the way attackers do. 👀

Meet ShareHound, an OpenGraph collector for BloodHound CE & Enterprise that reveals share-level attack paths at scale. @podalirius unpacks all the details in our latest blog post. https://ghst.ly/4ogiBqt

ShareHound: An OpenGraph Collector for Network Shares

ShareHound is an OpenGraph collector for BloodHound CE and BloodHound Enterprise helping identify attack paths to network shares automatically.

SpecterOps

🕵️ Uncovering network attack paths with runZeroHound!

As of today you can feed your runZero asset inventory into @SpecterOps BloodHound v8. runZeroHound is an open source toolkit that brings your runZero asset data into BloodHound’s OpenGraph model to reveal real-world attack paths.

👉 @hdm breaks it down in his latest post: https://www.runzero.com/blog/introducing-runzerohound/

Credential Guard was supposed to end credential dumping. It didn't.

Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.

Read for more: https://ghst.ly/4qtl2rm

Catching Credential Guard Off Guard

Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.

SpecterOps

#SOCON2026 is where the global security community unites to push the boundaries of identity-first defense.

Got insights on attack paths, identity risks, or BloodHound OpenGraph? Submit your talk to our CFP before it closes Nov. 15 ➡️ https://ghst.ly/socon26-cfp

The CFP for #SOCON2026 is OPEN! 🙌

Have you been working on something interesting in Attack Path Management or identity-first defense? Join us in Arlington, VA (April 13–14) and share your work with the community.

Submit your talk by Nov. 15 → https://ghst.ly/socon26-cfp

Microsoft introduced nested application auth (NAA) in 2024. Researchers spotted FOCI similarities & dubbed it brokered client IDs (BroCI).

Hope Walker documents NAA flows and BroCI—filling a gap for research on Microsoft identity protocols. Read more: https://ghst.ly/3Jdhp7Z

NAA or BroCI…? Let Me Explain

This writeup is a summary of knowledge and resources for nested application authentication (NAA) and brokered client IDs (BroCI)

SpecterOps

Your strongest platform is only as secure as its weakest dependency. And you probably don't know what those are.

Jared Atkinson dives into the Clean Source Principle, hidden trust relationships, & why BloodHound OpenGraph changes the game. https://ghst.ly/4pYTtFU

The Clean Source Principle and the Future of Identity Security

TL;DR Modern identity systems are deeply interconnected, and every weak dependency creates an attack path — no matter how strong any single platform appears. The Clean Source Principle and BloodHound OpenGraph make these hidden relationships visible, empowering defenders to treat Attack Path Management as an ongoing discipline rather than a one-time project. Introduction In his 2024 blog post, The Security […]

SpecterOps

Red teams slip past detection. Defenders adapt. The cycle continues. 🔄

John Wotton's latest on AI gated loaders shows how offensive operators are using LLMs to make shellcode execution context-aware, executing only when OPSEC policies are met. https://ghst.ly/4nvxsgh

AI Gated Loader: Teaching Code to Decide Before It Acts - SpecterOps

My eyes and ears when I cannot be there, AI gated loaders inspect the victim machine and wait for the right moment to execute.

SpecterOps

Securing Domain Controllers without breaking AD is harder than it sounds. Michael Grafnetter at HIP Conference covers:

✅ IaC approach to Windows Firewall policy
✅ RPC filters & outbound traffic controls
✅ Hybrid environment challenges
✅ Network service discovery

Learn more: www.hipconf.com/agenda/