βš™ Rev - ☁️ Cloud Mechanic πŸ› οΈ's Avatar

βš™ Rev - ☁️ Cloud Mechanic πŸ› οΈ

@manuelberrueta

Offensive Security Engineer 🐍 #RedTeam + #AppSec @MSFT Marine, Husband, Father, N00b, Hacker⁉ πŸ€” My ramblings == my own 😁 Everything is a string! #ChangeMyMind πŸ›  github.com/ManuelBerrueta

76
Followers
30
Following
10
Posts
17.10.2023
Joined
Posts Following

Latest posts by βš™ Rev - ☁️ Cloud Mechanic πŸ› οΈ @manuelberrueta

Preview
GitHub - ManuelBerrueta/hacking-buddy-mcp: Hacking Buddy MCP is a proof-of-concept MCP Server on how AI can be leveraged in security operations/engagements. Hacking Buddy MCP is a proof-of-concept MCP Server on how AI can be leveraged in security operations/engagements. - ManuelBerrueta/hacking-buddy-mcp

Just dropped Hacking Buddy MCP 🧠πŸ’₯
A proof-of-concept #MCP server exploring how #AI can help in offensive #security + ops.

It's a PoC & light in tools, but built to share now, not wait for perfection.

πŸ› οΈ Try it out: github.com/ManuelBerrue...
#infosec #redteam #AI #hackertools #cybersecurity

18.06.2025 12:43 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Azure DevOps Permission Analysis Investigating ADO Permissions For querying permissions in ADO we are going to be using the following two APIs: Security Namespaces - Query Access Control Lists - Query

Who has what access to what in Azure DevOps (ADO)? πŸ€”

Understanding Azure DevOps permissions is critical for security.

πŸ” I walk through how to analyze permissions.

manuelberrueta.github.io/supply_chain...

#AzureDevOps #DevSecOps #RedTeam #Pentesting

15.03.2025 01:29 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸš€ Task Groups in ADO make automation easy, but what happens when they’re misused?

From efficiency to exploitation, I break down Task Groups here: [https://manuelberrueta.github.io/supply_chain_security/2025/03/14/ADO_Task_Groups-index.html]

#AzureDevOps #RedTeam #Security #Pentesting

14.03.2025 22:45 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

I like magic too 😈

29.12.2024 16:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
LinkedIn This link will take you to a page that’s not on LinkedIn

Last post(s) of the year:

- Exploring "Scripting in Bruno" for #API Hacking
lnkd.in/gX9-s-3d
- Unveiling the outcomes of the initial execution of Connect-MsGraph⁉:
lnkd.in/gp89aNKY

Wishing everyone a joyful Christmas πŸŽ„πŸŽ…β„, festive Holidays, and a prosperous New Year πŸŽ†πŸŽ‡πŸ₯‚πŸ»!

27.12.2024 00:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Fabian, you are telling me that you are looking at alert and your logs!? 😊

20.12.2024 00:30 πŸ‘ 1 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
Donate to Help the Bischoff Family in Their Time of Loss, organized by Paige Wieser We invite you to bless the Bischoff family. The expense that follows trag… Paige Wieser needs your support for Help the Bischoff Family in Their Time of Loss

I just donated to support the Bischoff family after their heartbreaking loss. Every little bit helps during this tough time. Please consider sharing or donating if you can. Thank you. We miss you Zion πŸ™

gofund.me/7ac27a7e

19.11.2024 03:54 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

All the videos from BlueHat are up. www.youtube.com/playlist?lis...

11.11.2024 22:24 πŸ‘ 16 πŸ” 8 πŸ’¬ 0 πŸ“Œ 0

Happy birthday #Marines!

10.11.2024 20:30 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

Great advice:
⚠ "DON'T ROLL YOUR OWN CRYPTO...AND AUTH!" ⚠
There are great libraries available for this!
Don't make this πŸ‘† mistake ❌!
It's very ⬆ high risk, ⬇ low reward with expensive πŸ’°πŸ’Έ consequences πŸ“‰!

#appsec #security #infosec #cybersecurity #cloud #cloudsecurity

15.11.2023 15:16 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

πŸ€–πŸ”΄ www.whitehouse.gov/briefing-roo...

30.10.2023 20:43 πŸ‘ 3 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0