Shellstorm
shellstorm.bsky.social
Shellstorm
@shellstorm.bsky.social
The Bman; Canadian, hacker, dad, martial artist, gamer.
Reposted by Shellstorm
I know something like this already exists somewhere, and absolutely open to learning better ways:

github.com/mubix/Find-W...

For finding what might be affected by CVE-2025-59287 or you can use an EDR / OSQuery to find systems with the WSUSService service.
GitHub - mubix/Find-WSUS: Helps defenders find their WSUS configurations in the wake of CVE-2025-59287
Helps defenders find their WSUS configurations in the wake of CVE-2025-59287 - mubix/Find-WSUS
github.com
October 28, 2025 at 1:17 AM
Reposted by Shellstorm
It's another #BloodHoundBasics day with Stephen Hinck!

Go back ⬅️, forward ➡️, & share your BloodHound view 👀. Earlier this year, we added Back button support directly through your browser. You can also copy your current URL & share it with a teammate so they see what you see.
October 24, 2025 at 6:27 PM
Reposted by Shellstorm
If you're using Mac in enterprise, you're going to be fighting an uphill battle trying to achieve feature parity for compliance and security tooling with the rest of your Windows fleet. Which leads to the obvious question: is the total cost worth it?
October 24, 2025 at 7:19 PM
Reposted by Shellstorm
Did you know that you can passively download malicious payloads onto target systems?

Lots of software caches images locally to save bandwidth, often without stripping metadata first.

You can leverage this functionality to download payloads.

malwaretech.com/2025/10/exif...
Look At This Photograph - Passively Downloading Malware Payloads Via Image Caching
Detailing an improved Cache Smuggling technique to turn 3rd party software into passive malware downloader.
malwaretech.com
October 24, 2025 at 8:17 PM
@tommorelloofficial.bsky.social the offer still stands: when you're in Guelph this weekend you're more than welcome at our D&D table for a one-shot. Let me know your class and species and we'll have a miniature printed and painted for you. Now to roll for Persuasion...
a blurred image of a red sphere with a black background
ALT: a blurred image of a red sphere with a black background
media.tenor.com
October 20, 2025 at 10:30 PM
@tommorelloofficial.bsky.social I see you're going to be in Guelph in October. You want to come play some D&D with my group while you're in town? If you can join, let me know your species and class and I'll have a miniature ready for you.
May 29, 2025 at 1:09 PM
Reposted by Shellstorm
Hello everyone! I’m proud and honored to introduce my very first academic white paper through SANS, which discusses the nuances and needs for planning for #ransomware in OT / industrial networks. www.sans.org/mlp/ics-ot-m...
April 16, 2025 at 3:39 AM
@colbypoulson.bsky.social any chance for a few more BG3 builds now that patch 8 is out?
April 16, 2025 at 12:16 AM
Had a great time attending and speaking at AtlSecCon this year! Thanks to everyone who came to my talk!
April 12, 2025 at 4:04 PM
Elbows up, fellow Canadians. Elbows up.
March 4, 2025 at 6:59 PM
Reposted by Shellstorm
KrbRelayEx - a tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets. It listens for incoming SMB connections and forwards the AP-REQ to the target host, enabling access to SMB shares or HTTP ADCS endpoints on behalf of the targeted identity.
GitHub - decoder-it/KrbRelayEx
Contribute to decoder-it/KrbRelayEx development by creating an account on GitHub.
github.com
November 25, 2024 at 5:31 PM
Trying to rebuild my follow list here. Hopefuly the infosec scene on BlueSky is as good as it was on Twitter before things....changed.
November 21, 2024 at 3:38 PM