669 Followers
156 Following
59 Posts

Data breach revealed,
Malware lurks, silent, stealthy -
OSINT tracks the thread.

URLs I post may contain malware – be careful and check yourself before running anything.

Websitehttps://r1cksec.de
Githubhttps://github.com/r1cksec
Twitterhttps://twitter.com/r1cksec
BlueSkyhttps://bsky.app/profile/r1cksec.bsky.social

A post about identifying key areas of Configuration Manager (SCCM) infrastructure that defenders can implement for deception solutions

https://specterops.io/blog/2026/02/19/mapping-deception-solutions-with-bloodhound-opengraph-configuration-manager

#infosec #cybersecurity #redteam #blueteam #windows #dfir

Mapping Deception Solutions With BloodHound OpenGraph  – Configuration Manager

Deception and canary development implemented in SCCM can be used to alert upon cyber attacks and intrusions. This blog provides step by step guidance to implement deception solutions and use BloodHound OpenGraph for planning.

SpecterOps

Opening a file in GNU Emacs can trigger arbitrary code execution through version control (git), most requiring zero user interaction beyond the file open itself.

https://github.com/califio/publications/blob/main/MADBugs/vim-vs-emacs-vs-claude/Emacs.md

#infosec #cybersecurity #redteam #pentest #ai #emacs #claude

publications/MADBugs/vim-vs-emacs-vs-claude/Emacs.md at main · califio/publications

Publications from Calif. Contribute to califio/publications development by creating an account on GitHub.

GitHub
Vim tabpanel modeline escape affects Vim < 9.2.0272

Vim tabpanel modeline escape affects Vim < 9.2.0272 =================================================== Date: 30.03.2026 Severity: High CVE: *not-yet-assigned* CWE: Improper Neutralization of ...

GitHub

Extract Windows credentials directly from VM memory snapshots and virtual disks

https://github.com/nikaiw/VMkatz

#infosec #cybersecurity #redteam #pentest #windows #opensource

GitHub - nikaiw/VMkatz: Extract Windows credentials directly from VM memory snapshots and virtual disks

Extract Windows credentials directly from VM memory snapshots and virtual disks - nikaiw/VMkatz

GitHub
Default TLS Exclusions for Palo Alto Networks Firewalls

Default TLS Exclusions for Palo Alto Networks Firewalls - panw-exclusions.json

Gist

This repo contains the design plan and runbook for using Claude Code to search for Java Deserialization Gadget chains.

https://github.com/atredispartners/llmchainhunter

#infosec #cybersecurity #redteam #pentest #ai #llm #opensource

GitHub - atredispartners/llmchainhunter: Leveraging LLM to generate Java deserialization chains

Leveraging LLM to generate Java deserialization chains - atredispartners/llmchainhunter

GitHub

A project that loads .NET assemblies into memory within an IIS environment running in full‑trust mode. It uses reflective loading techniques to inject inside the memory space of the w3wp.exe worker pool process

https://github.com/zux0x3a/Phantom

#infosec #cybersecurity #redteam #pentest #windows

MacOS Redteam 3: Initial Access with DarwinOps PKG

State of the art:

Medium

Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory)

https://github.com/memN0ps/armory-rs

#infosec #cybersecurity #redteam #pentest #rust

GitHub - memN0ps/armory-rs: Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory)

Rusty Armory - Beacon Object Files (BOFs) in Rust (Codename: Armory) - memN0ps/armory-rs

GitHub

It is possible as a low privileged user to parse the Windows event logs for any ASR exclusion

https://primusinterp.com/posts/WindowsASR/

#infosec #cybersecurity #redteam #pentest

Cheesing Microsoft Attack Surface Reduction rules

While working on varying engagements i have been messing with Microsoft Attack Surface Reduction (ASR) quite a bit, since clients often use it to make the life of adversaries(and red teamers) just a tad harder. While working on these engagements i have compiled some tips and tricks in order to bypass/evade some of the rules that ASR offers. In this post i will dive into what ASR is and some of tips and tricks that i often use to bypass/cheese my way around said rules… So strap in and lets get going with some basic ASR understanding.

. .\Primusinterp