nyxgeek
@nyxgeek
rebel scum, nerfherder, dogged and relentless. H/P/V/A/C Directory - https://midnightcomputerlab.net/directory/
If anyone wants to check out my DEF CON talk about massive user enumeration, presence monitoring, and guest relationships in Azure, they posted the video a few days back. Track the Planet! youtu.be/4AY5uS3yFjE?si…

Tried @DrAzureAD's aadinternals.com/osint/ for an anonymous domain lookup. But Microsoft's changes mean that's no longer an option! 😔 So, I fired up PowerShell and ran Resolve-MsIdTenant (from aka.msid) against his domain. BOOM!
Friendly reminder to set up (or review) your security.txt securitytxt.org
Some companies really make it hard to do the right thing. Found a neat "feature" and want to report it. Have tried contact form on their site, emails to IT staff I've enumerated, even tried messaging employees on LinkedIn. Maybe the WHOIS contact will work.
Some companies really make it hard to do the right thing. Found a neat "feature" and want to report it. Have tried contact form on their site, emails to IT staff I've enumerated, even tried messaging employees on LinkedIn. Maybe the WHOIS contact will work.

This might be useful for enumerating the SaaS products companies use, but it was more of an exercise in seeing how many DNS patterns I could get public LLMs to generate. github.com/HackingLZ/saas…
Black Mass Volume III is available for free as a PDF and for sale as a physical copy on Amazon Locations available: US, UK, DE, FR, ES, IT, NL, PL, SE, JP, CA, AU Subsequent post contains link to US Amazon link. Use your countries Amazon domain to buy the book.
why has IRAN suddenly deployed so many SharePoint honeypots? that started in MAY 2025...
If you can’t enable AMSI remove server from internet oh and buy MDE 😂
"⚠️ Educational use only. Do not use against unauthorized systems." github.com/soltanali0/CVE…
🚨If you're running SharePoint on-premises, you need to stop what you're doing and watch this video by @Carlos_Perez. A critical vulnerability is being actively exploited right now, and it's hitting organizations hard. Learn more on our website: trustedsec.com/about-us/news/…
We are observing active global exploitation of critical Microsoft SharePoint vulns CVE-2025-49704 and CVE-2025-49706. Orgs worldwide are being targeted. Patch immediately. The exploits are real, in-the-wild and pose a serious threat. IoCs we've seen: bit.ly/4kQZS2e
Hey they finally enabled this techcommunity.microsoft.com/blog/exchange/…
Seems a lot of tools went domain name -> tenant name via GetFederationInformation which is now broke If you want a cheap hack before chasing down more end points just parse the SPF
Dear Microsoft this was a minor annoyance but thanks for playing with the implementation over the weekend. 🙃😉 I’m still kicking ass. techcommunity.microsoft.com/blog/exchange/…
I forgot who did this but I had it saved for next time there was a CTI convo