🔒 FTRSec 🐼
banner
ftrsec.bsky.social
🔒 FTRSec 🐼
@ftrsec.bsky.social
┌──(ftrsec㉿kali)-[/opt/bluesky]
└─# cat bsky_desc.txt
#Cybersecurity Sr. SOC analyst & builder
#Redteam lecturer at university
#Splunk expert
I love pandas
Pinned
We often talk about #AI for redteam, but barely about redteam for AI.
In this thread are some valuable ressources to help you for future AI #redteam.
It also can help #blueteam to improve their #detection and knowledge about these attacks.

#cybersecurity #infosec #technology

atlas.mitre.org
MITRE ATLAS™
atlas.mitre.org
Splunk Docs
undefined
help.splunk.com
July 30, 2025 at 2:41 PM
An interesting detailed article about an advanced attack and the TTP used

securelist.com/apt41-in-afr...

#Detection #malware #IoC #Cybersecurity
SOC files: an APT41 attack on government IT services in Africa
Kaspersky experts analyze an incident that saw APT41 launch a targeted attack on government IT services in Africa.
securelist.com
July 22, 2025 at 3:28 AM
www.akamai.com
January 29, 2025 at 8:14 AM
Happy new year ! Wish you all the best for the 2025 year !

I'm back to activity after a quick break, starting by sharing an interesting article about EAGERBEE backdoor.

securelist.com/eagerbee-bac...

#Cybersecurity #IoC #malware #infosec
The EAGERBEE backdoor may be related to the CoughingDown actor
Kaspersky researchers analyze EAGERBEE backdoor modules, revealing a possible connection to the CoughingDown APT actor.
securelist.com
January 7, 2025 at 7:01 AM
Reposted by 🔒 FTRSec 🐼
#pwsh tip of the day!

$PSBoundParameters doesn't account for params whom have a default value. Thankfully, you can still get this information! Enter $PSCmdlet! You can pull the bound parameters off of the Invocation Property of that object.

I put together a quick example at:

Happy Scripting!
Get all parameters to function, including default values
Get all parameters to function, including default values - Get-AllBoundParameters.ps1
gist.github.com
January 6, 2025 at 8:33 PM
Reposted by 🔒 FTRSec 🐼
apkleaks: Scanning APK file for URIs, endpoints & secrets meterpreter.org/apkleaks-sca...
apkleaks: Scanning APK file for URIs, endpoints & secrets
APKLeaks using jadx dissambler to decompile APK file. If it doesn't exist in your environment, it'll ask you to download or nah.
meterpreter.org
January 7, 2025 at 4:57 AM
Reposted by 🔒 FTRSec 🐼
Adding to my ETW research toolkit, a tiny program to consume information from a provider with as little overhead as possible.

PockETWatcher, a tool to get the essential information from a ETW provider to the CLI or a JSON file

github.com/olafhartong/...
GitHub - olafhartong/PockETWatcher: a tiny program to consume an ETW trace for research
a tiny program to consume an ETW trace for research - olafhartong/PockETWatcher
github.com
January 4, 2025 at 9:15 PM
Merry Christmas to everyone! 🥳

Big respect to those in cyber holding the fort today ! Thank you !
December 25, 2024 at 2:53 PM