Will Hunt @[email protected]
@Stealthsploit
Hacker, Black Hat trainer, speaker, musician, gamer. Co-founded @insecurity_ltd. http://In.security Discord - https://discord.gg/aCgUbE8ePD
We've decided to make our #Password Cracking 101+1 #training FREE. 15 vids over 15 weeks starting this Wednesday and a VM so you can follow along and make it rain plains with us. in.security/technical-trai… #cyber #cybersecurity #hashcat
Not long to go until @BlackHatEvents USA! Whether attacking or defending, we've got you covered💪Check out our Hacking Enterprises, and Defending Enterprises training in.security/events/ #pentest #redteam #hacking #threathunting #blueteam #kql #microsoftsentinel
@Stealthsploit being called "Will Hunt" is up there alongside @rez0__ having Hacker in his name, as great examples of nominative determinism: en.m.wikipedia.org/wiki/Nominativ… Thank you both for making my day 🤝
Having a great day at @Steel_Con with the family, stopped by the @PortSwigger booth to talk Burp, and relaxing u til talk at 4.30 😎
My son has been in a full on nerf war with @Scott_Helme at @Steel_Con for the last 15 mins. Hes taking no prisoners! 💪😎

Having a great day at @Steel_Con with the family, stopped by the @PortSwigger booth to talk Burp, and relaxing u til talk at 4.30 😎

If you’re at @Steel_Con next weekend, swing by my talk on crazy password attacks, data breach adventures and transliterated foreign language hash cracking with hashcat 💪
Speaking at @BSidesLeeds last week, running training at @WEareTROOPERS this week with the @insecurity_ltd team, busy busy!
Fascinating talk about password cracking from @Stealthsploit at @BSidesLeeds - things have moved on from the l0phtcrack days which is when I last dabbled. Spoiler: total brute force not required as you humans are somewhat predictable beasts😃
Did you know that you can kerberoast without any valid credentials? All you need is an account that is ASREProastable. This allows you to request service tickets for any account with a set SPN🔥 NetExec now has a native implementation of this technique, thanks to Azox
My talk from @securityfest is now live for any interested security enthusiasts, pentesters, red teamers and password crackers. Fun fact, my voice is that annoying in real life too. youtube.com/watch?v=ArLhwc…
Having someone enjoy our training and come back to sit it a second time is pretty humbling. It was great seeing you again @RogerBergling, thanks for joining us at @securityfest!!
(Take this course if you can) What do I think of the Hacking Enterprises 2025 Edition course from @insecurity_ltd with @Stealthsploit blog.invid.eu/2025/06/10/wha… @securityfest @rebootuser #hacking
Following my @securityfest talk yesterday I've released Hashcatalyst, a wrapper that helps automate non-distributed workflows by chaining multiple attacks with no downtime. github.com/stealthsploit/… #hashcat
🎉 Speaker Announcement — Will Hunt 🎉 We're excited that @Stealthsploit will be at BSides Leeds to present 'Plundering and pillaging passwords'. Catch Will's talk at 11:50 on the 21st!
For my @securityfest talk next week I'll be releasing a new tool to help automate non-distributed #hashcat workflows, allowing people to chain multiple attacks with no downtime. Keep your eyes peeled!
Last chance to grab yourself a ticket to our Hacking Enterprises or Defending Enterprises training next week at @securityfest ! securityfest.com
Do not forget, as per tradition we will be opening up the #BruCON0x11 Ticket sale on June 1st at 5 PM CEST! More info will follow soon
Wordpress’s new bcrypt implementation is prehashed with SHA-384? Not good if so as it facilitates password shucking attacks? Surely better to enforce a length limit? cc @Chick3nman512