Cyber Podcaster/Hack The Narrative šŸ‡¶šŸ‡¦šŸ’ÆšŸ”„

Doha, Qatar
Joined January 2020
Kamran Saifullah retweeted
LinkedIn still has some bangers
Kamran Saifullah retweeted
Think your Active Directory has ā€œa fewā€ service accounts? Think again. I wrote a super quick blog post on discovering (potential) service accounts via a PS script, how to clean them up, and some monitoring best practices when admins are misusing them. medium.com/@Debugger/we-have…
6
40
259
I am attending WhiteHatDesert Conference 2025 at The NED in Doha, Qatar happening on 15th November 2025. #WHDCON2025 whd2025.kamransaifullah.com/
Kamran Saifullah retweeted
So special thanks to @M_haggis for taking it on, and giving the idea for a "ClickFix Wiki" a better home! It has been incorporated into his ClickGrab project. I wouldn't be able to maintain the site or resource, so I really appreciate him picking it up! mhaggis.github.io/ClickGrab/
An idea I had some time ago was to create an open-source project with community contributions to centralize different social engineering lure techniques & native GUI tools that could be leveraged for ClickFix... a LOLBins-style site w/ mitigations. Video: piped.video/UQqsaO5k2M0
4
33
1
167
Kamran Saifullah retweeted
A jr pentestor is about a 7/10 in technical understanding and documentation Zooming out the career ladder, it should be viewed at the upper end of mid level roles
I would argue that the massive flood of new people trying to ā€œbreak inā€ as juniors has actually raised the bar for juniors. Every day, hundreds of people wake up and decide they want to become a 5up3r l33t penetration tester or hax0r. And that’s awesome. There’s two problems though: 1) there just aren’t that many penetration testing roles available and 2) employers want to hire the best of the best. We might not like it, but when there’s a major surplus of candidates (and there is), employers can afford to be picky. And they will be. Can you blame them? That’s just supply and demand at work. When the market shifts and there’s a shortage of qualified talent for these roles, requirements loosen. But right now? The market’s flooded, the bar’s getting higher, and the competition is fierce. Plan and adjust accordingly.
7
1
80
Kamran Saifullah retweeted
Insane because Microsoft uses a tool like dnstwist to find lookalike domains in Defender for Office 365... but you have to pay for it The good news is this tool is FREE, so everyone can and should monitor for lookalike domains: dnstwist.it/ github.com/elceef/dnstwist
Crazy stuff that I saw online! šŸ˜‚ rnicrosoft šŸ”„
4
106
521
Kamran Saifullah retweeted
FYI: There has been an open RFC since 2021 to make install scripts opt-in for NPM: github.com/npm/rfcs/pull/488 About high time it is accepted and ratified! The pain of making this change will be ower than whatever horror will come next in the NPM ecosystem.
1
2
1
11
Kamran Saifullah retweeted
A threat actor installed Huntress. ... a hysterical mistake on their part, giving us first-hand insight to their tooling, workflow & routine. Phishing infra, stealer logs, Telegram+dark web sites, AI... Hilarious goldmine of cybercrime deets with a front row seat: huntress.com/blog/rare-look-…
73
263
67
1,581
Kamran Saifullah retweeted
🚨 Russia-linked hackers just hit Kazakhstan’s energy giant KazMunaiGas. The op—codenamed BarrelFire—used fake IT emails and booby-trapped ZIP files to drop malware, hijack systems, and open a backdoor. The worst part? It came from a real employee’s stolen account. Read more ↓ thehackernews.com/2025/09/no…
Kamran Saifullah retweeted
In case you missed it. The recent SalesLoft breach started from the threat actors stealing secrets from their GitHub Actions environment after adding a user (sound familiar?) trust.salesloft.com/?uid=Upd… Thanks @0xLupin for sharing the link!
1
4
28
Kamran Saifullah retweeted
Kamran Saifullah retweeted
The "Malware Analysis – Intermediate Level" training by @struppigel is 60% off right now Knowing the quality of his other content, I’d say this one’s definitely worth checking out malwareanalysis-for-hedgehog…
6
64
1
379
Highly recommended course by brother Ahmed!
I just published the next video in my series on Malware Development fundamentals. This one covers Module Stomping — a powerful technique where attackers overwrite the memory of a loaded module to stealthily execute malicious code. šŸ‘‰ In the video, I break down how it works and walk through example code step by step. Watch here: piped.video/wrmxc-vWCUU šŸ’” To go deeper and gain hands-on experience, I’m offering 30% off my Offensive Development & Tradecraft course for a limited time. Use code: OFFDEV30 at checkout šŸ”— ask-academy.live/courses/off…
Kamran Saifullah retweeted
I'm releasing my new tool: DllShimmer šŸ”„ Weaponize DLL hijacking easily. github.com/Print3M/DllShimme… - backdoor any function, no reverse engineering - all functions proxied, no program crash - built-in debug info and mutex to every function - more... #redteam #malware #security
5
109
386
This is amazing!
I’m excited to announce two major upgrades in our free product line: šŸ“¦ Archive scanning is now unlocked in THOR Lite - including docx, xlsx, jar, war, and more 🧠 YARA Forge (my own project) is now integrated – extends the detection coverage with open source rules šŸ” Also worth noting: SIGMA scanning has long been active in THOR Cloud Lite – and we plan to unlock even more modules in the cloud version only later this year Stay tuned
Kamran Saifullah retweeted
Still my favorite set of redirects. So many "hackers" probe these basic wordpress routes. Always nice to give them a pleasant distraction šŸ˜„
Kamran Saifullah retweeted
Ohhhh, sneaky masquerading trick found in the wild and noted by @JAMESWT_WT The Threat Actor replaces / with "悓", a Japanese character +2 cat pictures
51
250
14
3,784