Twitter | Search | |
Chris Nickerson
Lares is a vendor agnostic firm providing penetration testing, app security & adversarial simulation services
15,687
Tweets
4,456
Following
14,222
Followers
Tweets
Chris Nickerson retweeted
Bill Pollock Dec 17
It's here! Our latest Humble Bundle and my gift to you all. Happy holidays and please RT!
Reply Retweet Like
Chris Nickerson 6h
Replying to @vysecurity
Show it!
Reply Retweet Like
Chris Nickerson Dec 16
Reply Retweet Like
Chris Nickerson Dec 16
Replying to @blacktip
Luv
Reply Retweet Like
Chris Nickerson retweeted
Oscaron ☕ 🧐 Dec 13
Btw Win 10 users Sleep tight
Reply Retweet Like
Chris Nickerson retweeted
dade Dec 12
Hey there friends, acquaintances, internet strangers! As we approach the new year, I would like to encourage you to evaluate your digital footprint. I'll thread some useful things, but if you only see this tweet, check out And
Reply Retweet Like
Chris Nickerson retweeted
Sean Metcalf Dec 12
Patch your Domain Controllers running DNS (typical config, so most orgs) ASAP. DNS remote code execution vulnerability which runs as LocalSystem on Windows DNS server (usually a DC).
Reply Retweet Like
Chris Nickerson retweeted
Alex Levinson Dec 4
RFP is now open to join the Red Team. Qualifications: • Write custom malware and C2s • Ability to lay low and persist with an active defender DM me with why you're qualified and a resume. Only a handful of slots open. Good luck 😉
Reply Retweet Like
Chris Nickerson retweeted
Tim McGuffin Dec 7
Phrase of the day: "Security Virtue Signaling" I love it and hate it at the same time.
Reply Retweet Like
Chris Nickerson retweeted
The Haag™ Dec 6
Beautifully crafted App by . Uses , macros and lookups so well together! Excellent work!
Reply Retweet Like
Chris Nickerson retweeted
DirectoryRanger Dec 6
Get-AzurePasswords: A Tool for Dumping Credentials from Azure Subscriptions, by
Reply Retweet Like
Chris Nickerson Dec 6
Hahaha.. I totally went to the hospital after that talk
Reply Retweet Like
Chris Nickerson Dec 6
Tim Brown. badass work on the AD cred extraction tool for Unix. <- pulls Kerberos tickets and cached creds. HOT
Reply Retweet Like
Chris Nickerson retweeted
Ryan Kovar Dec 4
Very cool stuff dropped in this talk: A framework to deploy Windows versions of the techniques via ’s Atomic Red Team YAMLs. Loving it.
Reply Retweet Like
Chris Nickerson retweeted
DirectoryRanger Dec 5
Quick PowerShell script to extract any exclusions configured for Windows Defender
Reply Retweet Like
Chris Nickerson Dec 4
Make today count! Listen, learn, live and love.
Reply Retweet Like
Chris Nickerson Dec 3
Replying to @_MG_
Looks like some great work. What do you WANT to do?
Reply Retweet Like
Chris Nickerson Dec 3
Need root on your Subaru? Rooting the latest generation of Harman head units running on newer Subaru vehicles.
Reply Retweet Like
Chris Nickerson retweeted
Jessica Payne Dec 3
Want to find users and computers in Active Directory that can do Kerberos delegation and other potentially scary settings? has a script for that :
Reply Retweet Like
Chris Nickerson retweeted
Binni Shah Dec 2
GTRS - Google Translator Reverse Shell : This tools uses Google Translator as a proxy to send arbitrary commands to an infected machine : PoC : cc
Reply Retweet Like