Two Seven One Three
banner
twosevenonethree.bsky.social
Two Seven One Three
@twosevenonethree.bsky.social
Chief Security Officer (CSO) || Security Researcher at https://ZeroSalarium.com || Penetration Tester || Red Teamer || Social Engineering Awareness Trainer
Reposted by Two Seven One Three
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools🕵️‍♂️

github.com/gabriel-szte...

#infosec #cybersecurity #redteam #pentest #opensource #windows
GitHub - gabriel-sztejnworcel/pipe-intercept: Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools
Intercept Windows Named Pipes communication using Burp or similar HTTP proxy tools - gabriel-sztejnworcel/pipe-intercept
github.com
September 27, 2025 at 8:15 AM
Reposted by Two Seven One Three
Often when our list of Adobe alternatives is shared people comment that it's okay to pirate Adobe software. It's not, because that still supports Adobe through usage and staying in their ecosystem. Instead, do look into alternatives!

github.com/KenneyNL/Ado...
GitHub - KenneyNL/Adobe-Alternatives: A list of alternatives for Adobe software
A list of alternatives for Adobe software. Contribute to KenneyNL/Adobe-Alternatives development by creating an account on GitHub.
github.com
September 23, 2025 at 11:25 AM
Reposted by Two Seven One Three
A critical flaw in Microsofts Entra ID allowed undocumented Actor tokens to bypass tenant boundaries and impersonate Global Admins across any tenant via a Azure AD Graph API (CVE-2025-55241)🕵️‍♂️

dirkjanm.io/obtaining-gl...

#infosec #cybersecurity #pentest #redteam #cloud
One Token to rule them all - obtaining Global Admin in every Entra ID tenant via Actor tokens
While preparing for my Black Hat and DEF CON talks in July of this year, I found the most impactful Entra ID vulnerability that I will probably ever find. One that could have allowed me to compromise ...
dirkjanm.io
September 23, 2025 at 9:41 AM
Reposted by Two Seven One Three
The US Secret Service says it has dismantled 300+ SIM card servers in the NYC area that could have disrupted communications ahead of the UN General Assembly (Myles Miller/Bloomberg)

Main Link | Techmeme Permalink
September 23, 2025 at 11:50 AM
We can exploit the #securityvulnerability of Windows Error Reporting to put EDRs and #antimalware into a coma-like state.
By using the EDR-Freeze #redteam tool:
Github: TwoSevenOneT/EDR-Freeze
September 21, 2025 at 7:19 AM
Reposted by Two Seven One Three
#redteam
Now, you can dump the #Windows password from the LSASS process with help from the past: WerFaultSecure.exe
Github: 2x7EQ13/WSASS
Experimental version: Windows 11 24H2
#Blueteam
September 13, 2025 at 7:41 AM
#redteam
You can exploit the update functionality vulnerability of #Windows Defender to move its executable folder to a location of your choosing. After that, you can use DLL Sideloading for persistence, inject code, or simply disable it...
#blueteam
September 8, 2025 at 1:49 PM
It looks like an executable file with a .jpg extension from the early 2000s. But no! This is a method to create persistence with a non-existent executable file to bypass #antimalware
#PenTesting #BlueTeam
September 7, 2025 at 9:20 AM