Hacker of Things, Maker of Tools, Breaker of Stuff
I break, make, program and create things.
There are many projects that I am involved in that keep me always busy. Some of my primary focused projects are listed on the Projects page. Other projects and scripts that I create can be found on GitHub.
You will always find me at my local BSides, BSidesLV, BSidesDC, BSidesDE, BSides Charm or other security conferences such as Shmoocon, Defcon and Blackhat. I am usually running around Las Vegas (or sometimes other conferences) in a crazy looking tinfoil hat.
To find out more about me, visit the About page.
- RT @Snubs: Way to go, young people who don’t trust the vaccine because you read some shoddy Facebook post from a page made by APT29. They’re probably high fiving each other right now.@Snubs
- Me when doing advanced things with #git.@iDigitalFlame
- RT @defcon: From @thedarktangent's #defcon forums post:
"#defcon29 will be a hybrid con, partially in-person and partially online...This year is unique and will require us to simplify our plans, and be flexible."
Read all of DT's announcement on his blog:
- The one time my #archlinux install isn’t stable: Machine Check Exceptions due to my CPU dying.
Fun stuff! #linux@iDigitalFlame
- RT @dcskytalks: There's no easy way to say this, our friends. Unfortunately, Skytalks has made the very difficult decision to not do an in-person event for 2021. Our full announcement is at https://skytalks.info. We are still discussing what, if any, virtual event we might do instead. 1/4@dcskytalks
- RT @defcon: DC29 - The Signal https://open.spotify.com/playlist/77Xyr83sBuorUDdbqD4vTW?si=AyyaPUuPTtqzU8mghm9Hwg #NowPlaying@defcon
- Just added DLL injection support to the #windows side of my #golang malware framework XMT!
Update will be pushed to git soon @ https://github.com/iDigitalFlame/xmt@iDigitalFlame
- RT @MalwareTechBlog: Black Kingdom ransomware is by far the worst I’ve ever seen. It doesn’t exclude exe, dll, or sys files so in cases bricks the system. It doesn’t track if it’s been run previously, so every victim I’ve seen has been recursively encrypted at least 4 times. And it’s coded in python.@MalwareTechBlog
- RT @RSnake: If you use Express VPN you definitely need to read this: https://www.strikesource.com/2021/03/09/chinese-vpns-are-recording-world-data-on-a-massive-scale/@RSnake
- RT @SwiftOnSecurity: Exchange on-prem (likely) sees your password when you sign in from your phone. Every employee's password.
It has permissions to AD with its own implicit unmonitored service accounts, basically 1 step to Domain Admin.
It's often unmonitored for assumed performance reasons.@SwiftOnSecurity