Mr.Un1k0d3r
@mrun1k0d3r.bsky.social
Live hacking content https://truecyber.world/
Red team training https://mr.un1k0d3r.world/training/
Github https://github.com/Mr-Un1k0d3r
Red team training https://mr.un1k0d3r.world/training/
Github https://github.com/Mr-Un1k0d3r
I was invited to a cybersecurity podcast to talk about EDRs and red teaming. The podcast is in French.
www.linkedin.com/posts/charle...
#RedTeaming #EDR
www.linkedin.com/posts/charle...
#RedTeaming #EDR
#podcast #edr #redteaming | Charles F. Hamilton
Cette semaine, on parle EDR sur le podcast de PolySécure. Mieux comprendre leur mode de fonctionnement, mieux comprendre leur valeur autant du côté défensif qu'offensif, les enjeux pour l'industrie. B...
www.linkedin.com
November 10, 2025 at 1:55 PM
I was invited to a cybersecurity podcast to talk about EDRs and red teaming. The podcast is in French.
www.linkedin.com/posts/charle...
#RedTeaming #EDR
www.linkedin.com/posts/charle...
#RedTeaming #EDR
We are going live tonight at 7 PM EST.
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
trucyber.world
November 5, 2025 at 2:09 PM
We are going live tonight at 7 PM EST.
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
Tonight, we continue building a reconnaissance tool for Azure to identify Azure attack vectors. This is Part III and the final part of our Azure journey.
truecyber.world
#Azure #redteaming
If you are interested, I talked about cybersecurity during a podcast (it's in French). We talked about Azure and the trends I observed during red team exercises.
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
#podcast #cybersecurité | Charles F. Hamilton
J'ai une fois de plus eu la chance de participer au podcast de PolySécure pour discuter de cybersécurité. On a discuté d'Azure et des tendances que j'observe durant les exercices offensifs.
Bonne éco...
www.linkedin.com
October 21, 2025 at 12:54 PM
If you are interested, I talked about cybersecurity during a podcast (it's in French). We talked about Azure and the trends I observed during red team exercises.
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
www.linkedin.com/posts/charle...
#podcast #CyberSecurity
We are going live tonight at 7 Pam EDT. How Azure and Entra ID can be misused as part of a red team exercise. More information below.
#Azure
#RedTeam
www.linkedin.com/posts/charle...
#Azure
#RedTeam
www.linkedin.com/posts/charle...
Join TrueCyber Learning Platform | Charles F. Hamilton
Tonight I will continue to show how Azure and Entra ID can be misused as part of a red team exercise. We are going to code the tool live and explore Azure functionality that could be leveraged to gain...
www.linkedin.com
October 15, 2025 at 1:46 PM
We are going live tonight at 7 Pam EDT. How Azure and Entra ID can be misused as part of a red team exercise. More information below.
#Azure
#RedTeam
www.linkedin.com/posts/charle...
#Azure
#RedTeam
www.linkedin.com/posts/charle...
For some reason, Azure is assumed to be secure by design, which is not the case. Validating the default user permissions is important to ensure that everything that can be hardened is hardened.
#Azure #RedTeam
www.linkedin.com/posts/charle...
#Azure #RedTeam
www.linkedin.com/posts/charle...
#azure #redteam #pentest | Charles F. Hamilton
Français plus bas
Another week, another Azure advice.
We've previously talked about application permissions, phishing vectors, and more. Today, let's talk about Azure configuration itself. When was ...
www.linkedin.com
October 9, 2025 at 2:33 PM
For some reason, Azure is assumed to be secure by design, which is not the case. Validating the default user permissions is important to ensure that everything that can be hardened is hardened.
#Azure #RedTeam
www.linkedin.com/posts/charle...
#Azure #RedTeam
www.linkedin.com/posts/charle...
We are hiring for a senior red teaming / pentest role at CYPFER.
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
Senior Penetration Testing Consultant | Charles F. Hamilton
We are hiring for our Offensive team. If you are interested in red teaming and traditional pentesting in a highly motivated team, this is your opportunity.
If doing R&D, writing your own tools, and l...
www.linkedin.com
October 8, 2025 at 12:43 PM
We are hiring for a senior red teaming / pentest role at CYPFER.
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
Interested in applying, feel free to reach out to me.
100% remote role; more information here:
www.linkedin.com/posts/charle...
#redteam #hiring #pentest
We are going live tonight at 7 PM EDT.
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
October 1, 2025 at 1:21 PM
We are going live tonight at 7 PM EDT.
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
Tonight's session is about Microsoft Azure. We will do a deep dive into how it can be abused as part of a red team. We will automate the process by writing a complete tool to perform attacks and reconnaissance.
truecyber.world
The Azure Graph API /beta/users endpoint is definitely an interesting one, as it now includes on-premise Active Directory information, which was not included in the previous /v1.0/users.
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
#azure #redteam #graphapis | Charles F. Hamilton
Français plus bas
I showcased a few interesting Azure applications that can be used to gather more information than allowed by default, including ways to bypass UsersPermissionToReadOtherUsersEnabled...
www.linkedin.com
September 25, 2025 at 3:35 PM
The Azure Graph API /beta/users endpoint is definitely an interesting one, as it now includes on-premise Active Directory information, which was not included in the previous /v1.0/users.
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
www.linkedin.com/posts/charle...
#Azure #RedTeam #Graph
Interested in attack vectors in Azure.
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
#redteam #azure | Charles F. Hamilton
Français plus bas
Interested in learning more about Azure built-in applications that can be misused? Here is another one that allows you to list all the applications deployed within your tenant. A st...
www.linkedin.com
September 23, 2025 at 5:08 PM
Interested in attack vectors in Azure.
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
www.linkedin.com/posts/charle...
#Azure #RedTeam
I'm working on a useful tool that allowed me to discover quite a few interesting attack vectors in Azure.
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
https://linkedin.com/posts/charles-…
September 17, 2025 at 5:06 PM
I'm working on a useful tool that allowed me to discover quite a few interesting attack vectors in Azure.
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
UsersPermissionToReadOtherUsersEnabled bypass
MFA bypass
Privileges escalation
And more
www.linkedin.com/posts/charle...
#Azure #RedTeam
We are going live tonight at 7 PM EDT.
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
September 3, 2025 at 1:25 PM
We are going live tonight at 7 PM EDT.
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
Tonight's session is about running your own LLM locally and building a simple cross-platform .NET client interface to interact with it. The private LLM is quite useful during red team exercises.
truecyber.world
You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method.
github.com/Mr-Un1k0d3r/...
github.com/Mr-Un1k0d3r/...
GitHub - Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader: load shellcode without P/D Invoke and VirtualProtect call.
load shellcode without P/D Invoke and VirtualProtect call. - Mr-Un1k0d3r/DotnetNoVirtualProtectShellcodeLoader
github.com
September 2, 2025 at 1:50 PM
You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method.
github.com/Mr-Un1k0d3r/...
github.com/Mr-Un1k0d3r/...
It's time for the long weekend sale!
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
Mr.Un1k0d3r Offensive Red Team Training
mr.un1k0d3r.world
August 28, 2025 at 1:58 PM
It's time for the long weekend sale!
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
Get 50% OFF when you purchase both the Coding Class and the Red Team Training for just $400 (regularly $800). This includes over 200 hours of videos and source code.
More details here mr.un1k0d3r.world/training/a6e...
#redteam #discount
We are going live tonight at 7 PM EDT.
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
August 6, 2025 at 1:18 PM
We are going live tonight at 7 PM EDT.
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
Tonight's session is about understanding the underlying concepts of Active Directory Certificate Service (ADCS) and how certificate templates can be audited using C#.
truecyber.world
Next week, I will present a live webinar covering an interesting technique for executing shellcode using built-in .NET capabilities.
www.linkedin.com/posts/charle...
#redteam #webinar
www.linkedin.com/posts/charle...
#redteam #webinar
Next week, I will present a live webinar covering an interesting technique for executing shellcode using built-in .NET capabilities. | Charles F. Hamilton
Next week, I will present a live webinar covering an interesting technique for executing shellcode using built-in .NET capabilities.
Join us on August 6 to explore some of the tradecraft we developed...
www.linkedin.com
July 29, 2025 at 2:40 PM
Next week, I will present a live webinar covering an interesting technique for executing shellcode using built-in .NET capabilities.
www.linkedin.com/posts/charle...
#redteam #webinar
www.linkedin.com/posts/charle...
#redteam #webinar
We are going live tonight at 7 PM EST.
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
July 23, 2025 at 1:15 PM
We are going live tonight at 7 PM EST.
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
Tonight's session is about auditing and searching for misconfigured GPOs using C# during a red team exercise.
truecyber.world
We are going live tonight at 7 PM EDT.
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
July 2, 2025 at 12:57 PM
We are going live tonight at 7 PM EDT.
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
Tonight's episode is about writing your own SOCKS5 proxy that can serve as your complete C2, allowing you to perform all operations remotely.
truecyber.world
We are going live tonight at 7 PM!
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
June 4, 2025 at 3:11 PM
We are going live tonight at 7 PM!
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
Tonight's session is about incorporating sandbox evasion techniques into your malware using C and C#.
truecyber.world
The upcoming live session will be presented live from @northsec.io this Friday, May 16, 2025, at 1 PM EST.
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
May 15, 2025 at 2:24 AM
The upcoming live session will be presented live from @northsec.io this Friday, May 16, 2025, at 1 PM EST.
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
We will be chaining a novel technique in .NET that does not require any RWX memory allocation or external APIs.
truecyber.world
We are going live tonight at 7 PM EST.
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
April 23, 2025 at 1:14 PM
We are going live tonight at 7 PM EST.
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
Tonight's session is about Understanding Azure and Graph: Automating user enumeration and more.
We'll explore how to leverage Azure and Graph during a red teaming exercise.
truecyber.world
For the long weekend, I'm offering a 50% off discount on my coding class and Red Team course. You get both for $400 instead of $800. If you search a bit, you might even find an extra $50 discount using your web skills.
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
Mr.Un1k0d3r Offensive Red Team Training
mr.un1k0d3r.online
April 18, 2025 at 12:34 PM
For the long weekend, I'm offering a 50% off discount on my coding class and Red Team course. You get both for $400 instead of $800. If you search a bit, you might even find an extra $50 discount using your web skills.
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
mr.un1k0d3r.online/training/lon...
Offer will last for 24 hours.
We are going live tonight at 7 PM EDT.
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
April 16, 2025 at 12:47 PM
We are going live tonight at 7 PM EDT.
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
Tonight's session is about gathering user information without using LDAP queries in an Active Directory domain, using WMI.
This is achieved by using a COM object and C.
truecyber.world
I wrote a white paper at CYPFER regarding the techniques we use during our red team engagement.
#redteam #cypfer
www.linkedin.com/posts/charle...
#redteam #cypfer
www.linkedin.com/posts/charle...
Advanced Red Teaming Tactics: Latest Trends For A Successful Exploitation | Charles F. Hamilton
I wrote a white paper that covers the attacks we often use during red team exercises, ranging from phishing vectors to EDR evasion, including exploitation and lateral movement.
This is just a small p...
www.linkedin.com
April 14, 2025 at 3:00 PM
I wrote a white paper at CYPFER regarding the techniques we use during our red team engagement.
#redteam #cypfer
www.linkedin.com/posts/charle...
#redteam #cypfer
www.linkedin.com/posts/charle...
It is an honor to present at Offensive X this summer. I'm looking forward to sharing some of my tradecraft when it comes to red teaming payload crafting.
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
#redteam #livesession #athens | Charles F. Hamilton
It is an honor to present at Offensive X this summer. I'm looking forward to sharing some of my tradecraft when it comes to red teaming payload crafting.
Let…
www.linkedin.com
March 26, 2025 at 11:31 AM
It is an honor to present at Offensive X this summer. I'm looking forward to sharing some of my tradecraft when it comes to red teaming payload crafting.
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
Let me know if you're coming too so we can catch up!
www.linkedin.com/posts/charle...
We are going live tonight at 7 PM EDT.
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world
TrueCyber
TrueCyber
truecyber.world
March 12, 2025 at 1:52 PM
We are going live tonight at 7 PM EDT.
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world
Tonight's session will cover a method to gather Active Directory user information remotely in a Windows domain without using LDAP queries. Instead, we will use Lsa* APIs and a bit of magic.
truecyber.world