These guys dropped an absolute masterclass on AI agents.
No hype. No n8n spaghetti.
Just practical agent building, explained in away that anyone can understand.
Thanks @dexhorthy and @hellovai.
AI That Works is quickly becoming the best AI content on the Internet.
You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡
1) Create a clone into a new template of the target VM
2) Download the VMDK file of the template from the storage
3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY
(1/3)
🔥 Wow. Amazing blog post on Agentic Coding.
Views agentic coding as a deeply technical engineering craft.
Teaches you how to:
✅ Work in brownfield codebases
✅ Solve complex problems
✅ Not generate slop
✅ Maintain mental alignment across the team
From @dexhorthy
Had to cut down this video by a lot so I can make it more digestible for YT. Thinking about making a full one if this one does well. 👉🏼 youtu.be/evyxNUzl-HA
Interested in attack vectors in Azure.
I have documented another example to have read permission on all the applications exposed in the tenant and more. Blocking default applications is crucial to prevent such vectors.
linkedin.com/posts/charles-…#Azure#RedTeam
🚨 Chinese hackers are hijacking legit websites to poison Google results.
Experts uncovered Operation Rewrite: a BadIIS malware campaign targeting East & Southeast Asia—redirecting search traffic to scam sites and even planting web shells for deeper breaches.
Read →…
🚨 New DDoS-for-hire threat: ShadowV2
Hackers are renting out a botnet that hijacks misconfigured AWS Docker servers—using a Go-based RAT and Python C2 on GitHub Codespaces—to launch massive HTTP/2 “Rapid Reset” attacks and even bypass Cloudflare protections.
Read →…
5 Tools No Bug Bounty Hunter Should Be Without
===============
1. Burp Suite – The Swiss Army knife of web hacking; intercept, modify, and fuzz requests like a pro.
2. Nmap – Scan for open ports and services fast; knowing what’s exposed is half the hack.
3. FFUF – Fast web…
EDR-Freeze
This is a tool that exploits the software vulnerability of WerFaultSecure to suspend the processes of EDRs and antimalware without needing to use the BYOVD (Bring Your Own Vulnerable Driver) attack method.
github.com/TwoSevenOneT/E…
⚠️ First-ever GPT-4 powered malware uncovered.
Researchers found “MalTerminal,” a prototype that can write its own ransomware or reverse shell—code dated before Nov 2023.
Hackers are also slipping hidden prompts into phishing emails to trick AI scanners and unleash Follina…
You can watch the recorded stream on "CTAP Impersonation & API Confusion Attacks on FIDO2" here: youtube.com/watch?v=07B0et…
Check out our upcoming streams by @offby1security
kinda unhinged that none of the agent frameworks that were hot a year ago are used in any of the top coding agents
and now @opencode@CodebuffAI@claude_code are all adding agent-framework-y things...
at sprout we used to call this "refactor AFTER patterns emerge". its a good…
154 Followers 3K FollowingSharing insights on Al, Tech Tools, and Productivity | Helping people monetize with Al | Al Educator & Writer@theaidaily__l DM for Collab 💌
509 Followers 7K FollowingSharing insights on Al, Tech Tools, and Productivity | Helping people monetize with Al | Al Educator & Writer @theaidaily_|DM for Collab
112 Followers 189 FollowingThreat Intelligence and SOC specialist living in Munich. Stay tuned via my blog https://t.co/udChdt59Kh #cybersecurity #InfoSec #SOC #machinelearning #TreatIntel
16K Followers 29 FollowingTechnical Twitter of QiAnXin Technology, leading Chinese security vendor. It is operated by RedDrip Team which focuses on malware, APT and threat intelligence.
13K Followers 509 FollowingI don't know how to search on Google so I do research on my own and tweet about it. Hacking as a life style
https://t.co/a05mevChzu
38K Followers 132 FollowingDetect real, exploitable vulnerabilities. Harness the power of Nuclei for fast and accurate findings without false positives.
138K Followers 1 FollowingClaude is an AI assistant built by @anthropicai to be safe, accurate, and secure. Talk to Claude on https://t.co/ZhTwG8dz3D or download the app.
21K Followers 1 FollowingRME-DisCo research group from University of Zaragoza. Special interest on software and systems security. Link to our Telegram channel: https://t.co/UmkcXVG8MU
158K Followers 36 FollowingInvesting time & energy to help you learn
I offer no Telegram/WhatsApp subscription services!
X subscription available for access to informative tweets
5K Followers 32 FollowingOfficial account for Cobalt Strike. Benchmark red teaming tool known for its flexibility and powerful user community. Follow for new releases and other updates.
77K Followers 765 FollowingEnd-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet
Blogs, news, webinars, and tools!
305 Followers 78 FollowingI am/was independent,
(LOVE💕LOVE) + Peace,
fan of Mr.Trump, (over 97% iranian people wants Diplomatic relation back to the US-IR for ever), 'good relationship'
106K Followers 7 Followinghttps://t.co/fgXNGNt7gm
Abandoned this site in 2022 but hopeful for the future of social media. Consider migrating to DEFCON.socal
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
No recent Favorites. New Favorites will appear here.