Posts

Showing posts from November, 2025

Complete In-Memory Toolkit & Methodology.

For those not well versed on history, one of the most daring letters of all time was sent to Stalin from Josip Broz Tito who was a leader from the former Yugoslavia. It only said the following: "Stop sending people to kill me. We've already captured five of them, one of them with a bomb and another with a rifle. If you don't stop sending killers, I'll send one to Moscow, and I won't have to send a second." Knowing Stalin's reputation at that time, not many people would make threats to him. If they did, they were usually made an example of. Tito lived on to age 87 only to die of complications from gangrene. For whatever reason, his reports of assassination attempts also ended after that letter. So he was one of the few people that at least scared Stalin enough to back off, which was very rare. For this reason, when I thought of the stealthy assassin this rootkit could be, only one name came to mind. It seems for a while now, most malware has been moving to ...

Exploring AADInternals & Azure attack surfaces with AI

Image
Inside Azure Recon: AADInternals, AI, and Visual Map Inside Azure Recon: AADInternals, AI, and Visual Map By Bryce — Security technologist, creative coder, and relentless tinkerer. 🔍 What is AADInternals? AADInternals is a powerful PowerShell module developed by Nestori Syynimaa that allows deep inspection and manipulation of Azure Active Directory (AAD) environments. It’s a favorite among red teamers and penetration testers due to its ability to: Enumerate tenants and domains Extract tokens and credentials Simulate federation and SSO attacks Bypass MFA under certain misconfigurations Perform passive reconnaissance without triggering alerts 🌐 Why Azure, OneDrive, and Office365 Are Prime Targets With the explosion of cloud adoption, Microsoft’s ecosystem—especially Azure, OneDrive, and Office365—has become a goldmine for adversarial hackers. These platforms are: Ubiquitous: Used by millions of or...