An Evening with Claude (Code) - SpecterOps
This blog post explores a bug, (CVE-2025-64755), I found while trying to find a command execution primitive within Claude Code to demonstrate the risks of web-hosted MCP to a client.
AI tooling and MCP servers are entering enterprises fast, often faster than security teams can assess the risks.
During a recent engagement, @xpnsec.com found a new Claude Code vuln (CVE-2025-64755) while exploring MCP abuse paths.
π Read the details: ghst.ly/49ybl4W
21.11.2025 16:33
π 10
π 4
π¬ 0
π 0
Catching Credential Guard Off Guard - SpecterOps
Uncovering the protection mechanisms provided by modern Windows security features and identifying new methods for credential dumping.
Credential Guard was supposed to end credential dumping. It didn't.
Valdemar CarΓΈe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled.
Read for more: ghst.ly/4qtl2rm
23.10.2025 17:45
π 17
π 10
π¬ 0
π 0
GitHub - SpecterOps/Nemesis: An offensive data enrichment pipeline
An offensive data enrichment pipeline. Contribute to SpecterOps/Nemesis development by creating an account on GitHub.
Happy Friday! @tifkin.bsky.social and I are happy to announce that we have cut the release for Nemesis 2.0.0 - check out the CHANGELOG for a (brief) summary of changes, and dive into our new docs for more detail! We're extremely proud and excited for this release github.com/SpecterOps/N...
28.06.2025 04:14
π 12
π 6
π¬ 0
π 0
So, here's a little thread on my new open source project:
The Tradecraft Garden.
tradecraftgarden.org
It's Crystal Palace, an open-source linker and linker script specialized to writing PIC DLL loaders.
And, a corpora of DLL loaders demonstrating design patterns building tradecraft with it.
05.06.2025 14:36
π 24
π 13
π¬ 1
π 2
Post-ex Weaponization: An Oral History
aff-wg.org/2025/04/10/p...
A walk-through of some history on post-ex eco-systems used by CS (PowerShell, Reflective DLLs, .NET, and BOFs).
Ends with a coffee conversation talking about magician's guilds, security research, and ideas about what's next.
10.04.2025 14:24
π 12
π 7
π¬ 0
π 2
I attended last week's Pall Mall Process conference in Paris.
I wanted to dump a few notes, writing from my perspective as a security researcher, hacker, former entrepreneur, and creator of a well-known C2 platform (one that, importantly, I'm no longer involved with).
07.04.2025 22:21
π 4
π 3
π¬ 1
π 0
BIG NEWS: SpecterOps raises $75M Series B to strengthen identity security! Led by Insight Partners with Ansa Capital, M12, Ballistic Ventures, Decibel, and Cisco Investments. ghst.ly/seriesb
#IdentitySecurity #CyberSecurity
(1/6)
05.03.2025 17:33
π 16
π 9
π¬ 1
π 1
Not sexy things, but they make my day-to-day usage much better. I've seen many people bemoan about Ghidra 's interface. My experience with ANY tool is that things don't change unless the problem is reported to the devs. So reach out and lay out your concerns - they'll respond!
07.02.2025 21:00
π 2
π 1
π¬ 0
π 0
Ghidra 11.3 is out! There's some awesome new features, but I want to highlight how responsive the dev team is to questions, issues, and feature suggestions. They've addressed several issues I've opened, notably a bunch of quality of life UI/UX things I've had while using Ghidra.
07.02.2025 21:00
π 8
π 2
π¬ 1
π 0
@tiraniddo.dev Did you by chance check if the MUP redirector supports port specification in UNC paths?
31.01.2025 18:18
π 2
π 0
π¬ 1
π 0
SlackPirate Set Sails Again! Or: How to Send the Entire βBee Movieβ Script to Your Friends in Slack
TLDR: SlackPirate has been defunct for a few years due to a breaking change in how the Slack client interacts with the Slack API. It has aβ¦
SlackPirate sets sail again! π΄ββ οΈ
In his latest blog post, Dan Mayer intros his new PR to SlackPirate that lets you loot Slack again out of the box, a BOF to get you all the data you need to do it, & how to bee the most active slacker in your group chat. π ghst.ly/4hgwMIt
31.01.2025 16:27
π 5
π 5
π¬ 0
π 0
Misconfiguration Manager: Detection Updates
TL;DR: The Misconfiguration Manager DETECT section has been updated with relevant guidance to help defensive operators identify the mostβ¦
The Misconfiguration Manager DETECT section has been updated with fresh guidance to help defensive operators spot the most prolific attack techniques.
Check out the blog post from @bouj33boy.bsky.social to learn more. ghst.ly/3VJ5y4F
16.12.2024 16:08
π 6
π 4
π¬ 0
π 0
Want to run roadrecon, but a device compliance policy is getting in your way? You can use the Intune Company Portal client ID, which is a hardcoded and undocumented exclusion in CA for device compliance. It has user_impersonation rights on the AAD Graph π
12.12.2024 16:00
π 44
π 19
π¬ 3
π 1
I'm glad to release the tool I have been working hard on the last month: #KrbRelayEx
A Kerberos relay & forwarder for MiTM attacks!
>Relays Kerberos AP-REQ tickets
>Manages multiple SMB consoles
>Works on Win& Linux with .NET 8.0
>...
GitHub: github.com/decoder-it/K...
25.11.2024 17:31
π 62
π 42
π¬ 3
π 0
Defining the Undefined: What is Tier Zero, Part 4
On Demand
If you missed Part 4 in our What is Tier Zero webinar series hosted by Jonas BΓΌlow Knudsen, @martinsohn.dk & @tifkin.bsky.social last week, you can watch the full presentation on demand now!
π: ghst.ly/4eSssxL
19.11.2024 21:51
π 2
π 2
π¬ 0
π 0
Rashomon of disclosure
In a world of changing technology, there are few constants - but if there is one constant in security, it is the rhythmic flare-up of discu...
Tech companies could break backwards compat, move off legacy tech stacks, or move to secure defaults but choose not at the risk of affecting profits. Instead they move the risk to their downstream software consumers(businesses) who pay for it it breaches.
See addxorrol.blogspot.com/2019/08/rash...
15.11.2024 20:22
π 0
π 0
π¬ 0
π 0
On a similar vein of your original post, a hill I'll die on:
The majority of beaches are due to tech providers lack of prioritizing security, and not due to an average company's IT "not securing" their network.
15.11.2024 20:18
π 1
π 0
π¬ 1
π 0
So long and thanks for the CVEs!
12.11.2024 22:41
π 0
π 0
π¬ 0
π 0
Tomorrow, 10am, BinaryFormatter dies.
12.11.2024 04:19
π 93
π 25
π¬ 16
π 6
Exploiting KsecDD through Server Silos β SCRT Team Blog
π New blog post! "Exploiting KsecDD through Server Silos"
In my latest mini research project, I've been working with my teammate @PMa1n (X) on extending the work of @floesen_ (X) on the KsecDD driver. I'm thrilled to finally share the results.
π blog.scrt.ch/2024/11/11/e...
11.11.2024 13:40
π 12
π 7
π¬ 1
π 0