Don’t sleep on ASRGEN 🛡️💥
⚡ Point. Click. Generate ASR rules.
🔍 Learn + test safely with built-in atomic simulations
📦 Export to Intune/GPO-ready formats
🎯 Built for defenders, by defenders
👀🔥
👉 asrgen.streamlit.app
📚 github.com/MHaggis/ASRGEN
Don’t sleep on ASRGEN 🛡️💥
⚡ Point. Click. Generate ASR rules.
🔍 Learn + test safely with built-in atomic simulations
📦 Export to Intune/GPO-ready formats
🎯 Built for defenders, by defenders
👀🔥
👉 asrgen.streamlit.app
📚 github.com/MHaggis/ASRGEN
We started with ClickGrab, but then it turned into:
🐝 Beeceptor
🛠️ Mockbin
🧩 Zudoku
🔍 VirusTotal hunts
🤖 ChatGPT making OpenAPI bins & routes
Chaotic, nerdy, fun. Come hang out 👉 youtu.be/j7QE-6p9Y9Q
We started with ClickGrab, but then it turned into:
🐝 Beeceptor
🛠️ Mockbin
🧩 Zudoku
🔍 VirusTotal hunts
🤖 ChatGPT making OpenAPI bins & routes
Chaotic, nerdy, fun. Come hang out 👉 youtu.be/j7QE-6p9Y9Q
❌ Block rebooting in Safe Mode
🕵️♂️ Block copied/impersonated system tools
ASRGEN had these since preview. 😎
Want to:
⚡ Quickly create Intune-ready ASR policies
🧪 Simulate and understand rule impacts
Check → asrgen.streamlit.app
Be proactive. Be precise.
❌ Block rebooting in Safe Mode
🕵️♂️ Block copied/impersonated system tools
ASRGEN had these since preview. 😎
Want to:
⚡ Quickly create Intune-ready ASR policies
🧪 Simulate and understand rule impacts
Check → asrgen.streamlit.app
Be proactive. Be precise.
The first drops for PowerShell-Hunter: Season 2 are coming SOON.
New tools. Smarter hunting. Sexier telemetry.
This isn’t just DFIR—it’s an evolution.
⚔️ Hunt smarter. Hunt harder.
⭐ github.com/MHaggis/Powe...
The first drops for PowerShell-Hunter: Season 2 are coming SOON.
New tools. Smarter hunting. Sexier telemetry.
This isn’t just DFIR—it’s an evolution.
⚔️ Hunt smarter. Hunt harder.
⭐ github.com/MHaggis/Powe...
💥 More atomic tools
🧬 Smarter, faster log analysis
🤖 Machine learning meets lateral movement
😈 PowerShell so slick it should be illegal
You’re not ready—but you should be.
⭐ Star the repo or miss the magic:
💥 More atomic tools
🧬 Smarter, faster log analysis
🤖 Machine learning meets lateral movement
😈 PowerShell so slick it should be illegal
You’re not ready—but you should be.
⭐ Star the repo or miss the magic:
Check it out on GitHub: github.com/MHaggis/PowerShell-Hunter 💻
📺
Check it out on GitHub: github.com/MHaggis/PowerShell-Hunter 💻
📺
Windows permissions misconfigurations are a goldmine for attackers. SDDL (Security Descriptor Definition Language) remains overlooked yet highly exploitable. 🚨
@nasbench.bsky.social and I break it down -->
🧵 (1/)
Windows permissions misconfigurations are a goldmine for attackers. SDDL (Security Descriptor Definition Language) remains overlooked yet highly exploitable. 🚨
@nasbench.bsky.social and I break it down -->
🧵 (1/)
🔍 Defenders were stirring, their systems to vet.
🛠️ The telemetry was hung in EventViewer with care,
✨ In hopes that Jonny Johnson soon would be there.
📅 Friday, January 24th
⏰ 11 AM MST | 1 PM EST
📺
YouTube: youtube.com/watch?v=CqEhtg…
🔍 Defenders were stirring, their systems to vet.
🛠️ The telemetry was hung in EventViewer with care,
✨ In hopes that Jonny Johnson soon would be there.
📅 Friday, January 24th
⏰ 11 AM MST | 1 PM EST
📺
YouTube: youtube.com/watch?v=CqEhtg…
www.redroostercoffee.com/products/goo...
atomicroastery.com/products/mer...
www.redroostercoffee.com/products/goo...
atomicroastery.com/products/mer...
Having automated tools to spin up web servers isn’t just convenient—it’s a game-changer for defenders. Here's why:
Having automated tools to spin up web servers isn’t just convenient—it’s a game-changer for defenders. Here's why:
Dive into our latest blog where the Splunk Threat Research Team dissects the elusive Python malware and its sneaky obfuscated loader! 🐍🔍✨
🔓 Cracking the code of Braodo Stealer's obfuscation
Dive into our latest blog where the Splunk Threat Research Team dissects the elusive Python malware and its sneaky obfuscated loader! 🐍🔍✨
🔓 Cracking the code of Braodo Stealer's obfuscation
"'Haag do you have a easy way to build a Apache|NGINX|IIS server to easy simulate webshells?'
Hold my coffee... ☕
• 5-min Apache+PHP setup 🚀
• Drop-in webshell support 🎯
See you Tuesday! 😎
"'Haag do you have a easy way to build a Apache|NGINX|IIS server to easy simulate webshells?'
Hold my coffee... ☕
• 5-min Apache+PHP setup 🚀
• Drop-in webshell support 🎯
See you Tuesday! 😎
Attackers are weaponizing IIS modules for persistence, post-exploitation, and data theft.
Check out the blog + AOAF for more 🔥:
https://buff.ly/40UUWAI
Don’t wait—watch to strengthen your defenses:
Attackers are weaponizing IIS modules for persistence, post-exploitation, and data theft.
Check out the blog + AOAF for more 🔥:
https://buff.ly/40UUWAI
Don’t wait—watch to strengthen your defenses:
🔥 I somehow missed this, but WOW—what a fascinating deep dive into a DaaS operation! 🚀 Fully automated, primed for quick Ops, and makes you wonder about the ones we haven’t uncovered yet. 👀
https://buff.ly/3LCYEIP 🚨
🔥 I somehow missed this, but WOW—what a fascinating deep dive into a DaaS operation! 🚀 Fully automated, primed for quick Ops, and makes you wonder about the ones we haven’t uncovered yet. 👀
https://buff.ly/3LCYEIP 🚨
🔹 ✅ Validate AppLocker & WDAC: 🛡️ Test script execution in user & system paths seamlessly.
🔹 📝 Multiple File Types: Supports `.ps1`, `.bat` and more! 📂✨
Check it out here: https://buff.ly/3UVaJOm
🔹 ✅ Validate AppLocker & WDAC: 🛡️ Test script execution in user & system paths seamlessly.
🔹 📝 Multiple File Types: Supports `.ps1`, `.bat` and more! 📂✨
Check it out here: https://buff.ly/3UVaJOm
An oldie but a goodie!
🚀 Why you NEED to read this: 👉 Spot the bad guys! Uncover malicious scripts hiding in plain sight.
🔗 Blog: https://buff.ly/3YTbF75
💾 Utility: https://buff.ly/3UTO0m4
💥 Level up your logging game NOW! ⬆️
An oldie but a goodie!
🚀 Why you NEED to read this: 👉 Spot the bad guys! Uncover malicious scripts hiding in plain sight.
🔗 Blog: https://buff.ly/3YTbF75
💾 Utility: https://buff.ly/3UTO0m4
💥 Level up your logging game NOW! ⬆️
Test your defenses against indirect command execution via RunMRU dialogs! 🖥️ Dive into Atomic Test #5 for T1202 and see if your analytics stack is ready to detect this sneaky tactic.
🚀 Get started:
Test your defenses against indirect command execution via RunMRU dialogs! 🖥️ Dive into Atomic Test #5 for T1202 and see if your analytics stack is ready to detect this sneaky tactic.
🚀 Get started:
Ever wondered what app opens specific file extensions on your Windows machine? 🤔 Sure, it’s not new, but it’s super handy! 💪
Use this PowerShell magic to find file extensions and their associated apps
Ever wondered what app opens specific file extensions on your Windows machine? 🤔 Sure, it’s not new, but it’s super handy! 💪
Use this PowerShell magic to find file extensions and their associated apps