phrachtal's Avatar

phrachtal

@phrachtal

98
Followers
475
Following
3
Posts
30.06.2023
Joined
Posts Following

Latest posts by phrachtal @phrachtal

Preview
Punching Sideways While I no longer work in the C2 space and I don’t consider myself up on the operations side of red teaming, I watch the space closely to see where it’s going. In this post, I want to write about a…

Punching Sideways

aff-wg.org/2026/02/23/p...

23.02.2026 13:06 👍 11 🔁 4 💬 0 📌 0
GitHub - 0xTriboulet/emerald_template: A cmake template for crystal palace A cmake template for crystal palace. Contribute to 0xTriboulet/emerald_template development by creating an account on GitHub.

Posting this because I’m not sure Steve is on this platform. He’s made a CLion template for Crystal Palace.

github.com/0xTriboulet/...

10.12.2025 08:30 👍 9 🔁 2 💬 0 📌 1

[BLOG]
Cracking the Crystal Palace - detecting in-memory PIC using Crystal Palace's __resolve_hook() intrinsic.
rastamouse.me/cracking-the...

29.11.2025 22:55 👍 4 🔁 2 💬 0 📌 1
Preview
Red Team Ops II Gain the knowledge and skills necessary to operate against advanced defences.

The new version of RTO II is finally available to purchase.
www.zeropointsecurity.co.uk/course/red-t...

28.11.2025 14:30 👍 11 🔁 8 💬 1 📌 1

Looking to move to a PC from a MacBook Pro. It’s been a while since I’ve shopped Windows/Linux laptops. Is Framework the way to go or can I get better at that price point? Looks to be around 3k.

14.11.2025 12:08 👍 0 🔁 0 💬 0 📌 0

When I was a kid, the dishwasher on occasion was me. lol

13.11.2025 12:05 👍 1 🔁 0 💬 1 📌 0

As new projects, blog posts, and other efforts around TCG show up, I'm listing them here:

tradecraftgarden.org/references.h...

I've put together a Friends of the Tradecraft Garden list on BlueSky too:

bsky.app/profile/did:...

Thank you for building, exploring, & teaching w/ this young project 🪴

30.10.2025 04:24 👍 12 🔁 4 💬 0 📌 0
Preview
New Site Launch

ICYMI it on the heathen platform, I recently launched a new training portal for Zero-Point. Read more here: www.zeropointsecurity.co.uk/blog/new-sit...

20.05.2025 17:20 👍 7 🔁 3 💬 0 📌 0
Preview
Kerberoasting w/o the TGS-REQ Kerberoasting is a technique that allows an attacker to extract the encrypted part of a TGS-REP and brute force it offline to recover the plaintext password of the associated service account. The most...

[BLOG]
I had a series in mind like "Rubeus' Hidden Secrets" or something like that. Basically, highlighting features of the tool that seem less well known. I'm starting off with a basic one for getting crackable hashes from cached service tickets.

rastamouse.me/kerberoastin...

05.03.2025 16:50 👍 19 🔁 6 💬 0 📌 0

Dig through this timeline and you'll figure out what I'm here to do. I spoke to a commercial leader in the offensive security space last year. My words: you're fucking it up.

What I didn't say: I feel compelled, even though I DON'T want the bullshit, to try and fix it.

What does all of this mean?

15.03.2025 03:57 👍 23 🔁 10 💬 2 📌 4
Post image Post image Post image

The @trustedsec.com BoF dev class is up learn.trustedsec.com/catalog

04.12.2024 22:47 👍 18 🔁 7 💬 1 📌 0

I am trying to make a list of hackers, vulnerability researchers, penetration testers and red team folks. If you do those things can you please reply or like this post so i can find you?

04.12.2024 15:18 👍 7 🔁 2 💬 2 📌 0
CDS Repository - /var/www/public/stage/session-120/cds/vmw-desktop

for anyone out there who wants to download vmware "now that its free", but doesnt want to go through the fucking cirque de soleil trapeze act of auth and redirects and entitlements, someone on masto linked me to this - where you can just fetch ... everything, without need for their bullshit!

01.12.2024 21:53 👍 56 🔁 13 💬 6 📌 0
Timeroast with NetExec

Timeroast with NetExec

NetExec has a new Module: Timeroast🔥

In AD environments, the DC hashes NTP responses with the computer account NT hash. That means that you can request and brute force all computer accounts in a domain from an UNAUTHENTICATED perspective!

Implemented by Disgame

1/3🧵

01.12.2024 16:16 👍 13 🔁 5 💬 1 📌 1
x.com

x.com/al3x_n3ff/st...

01.12.2024 17:44 👍 1 🔁 0 💬 0 📌 0

AdobeFips - Adobe Reader Lolbin

www.hexacorn.com/blog/2024/11...

16.11.2024 18:12 👍 9 🔁 5 💬 1 📌 0
TrustedSec Tech Brief - November 2024
TrustedSec Tech Brief - November 2024 YouTube video by TrustedSec

TrustedSec Tech Brief

00:30 - NTLM Hash Disclosure Zero-Day
01:45 - Task Scheduler Vulnerability
02:30 - Exchange Server Issues
03:15 - AD Certificate Services Flaw
04:00 - Vulnerability Breakdown
04:45 - Palo Alto Zero-Day
05:30 - FortiGate VPN Update

www.youtube.com/watch?v=3mSD...

19.11.2024 16:32 👍 61 🔁 21 💬 3 📌 1
Preview
GitHub - som3canadian/Mythic_NimSyscallPacker_Wrapper: Mythic C2 wrapper for NimSyscallPacker Mythic C2 wrapper for NimSyscallPacker. Contribute to som3canadian/Mythic_NimSyscallPacker_Wrapper development by creating an account on GitHub.
22.11.2024 07:06 👍 6 🔁 4 💬 0 📌 0
Preview
GitHub - matro7sh/myph: shellcode loader for your evasion needs shellcode loader for your evasion needs. Contribute to matro7sh/myph development by creating an account on GitHub.
24.11.2024 16:46 👍 5 🔁 4 💬 0 📌 0
How To Use MSSQL CLR Assembly To Bypass EDR BackgroundA few days ago, I dealt with a blackmail incident involving an MSSQL database, which potentially evaded EDR detection. I intend to share the entire process. Upon analyzing the situation, I f
25.11.2024 08:07 👍 4 🔁 5 💬 0 📌 0