Just in time for Christmas: a repository for decrypting many encrypted D-Link firmware images. Also integrated into Binwalk for auto-magic decryption & extraction.
github.com/devttys0/delink
Linux kernel instrumentation from Qemu and gdb:
A technique to analyze binaries or kernel modules that may try to monitor themselves.
In this blog post Professor @Mad5quirrel explains the trick
blog.quarkslab.com/linux-kernel-i…
Latest additions to JA4+ include TCP fingerprinting! Technical write up: github.com/FoxIO-LLC/ja4/…
If you see an Epson Printer logging into your Okta server, you're about to have a bad day.
JA4T/S available now in Arkime, Wireshark, JA4TScan tool is coming next week as a zmap…
PoC to takeover Android using another Android by exploiting critical Bluetooth vulnerability to install #Metasploit payload without proper Bluetooth pairing (CVE-2023-45866)
It still affects Android 10 and bellow
mobile-hacker.com/2024/01/23/exp…#NetHunter
New @elastic blog post "Discovering anomalous patterns based on parent-child process relationships" covers a lot of material from my ProblemChild @CamlisOrg talk.
elastic.co/blog/discoveri…
Nice. About the current #Citrix unauth #RCE: it is a simple stack overflow, the affected binary was compiled without PIE, has executable stack, and also there are no stack canaries (on some versions). Back (at least) 10+ yrs in time. :)
Nice. About the current #Citrix unauth #RCE: it is a simple stack overflow, the affected binary was compiled without PIE, has executable stack, and also there are no stack canaries (on some versions). Back (at least) 10+ yrs in time. :)
🚨 The 2023 Global Threat Report is now live.
Discover the latest activities of the world’s most dangerous adversaries and CrowdStrike’s recommendations for protecting your business against modern attacks.
Access the report: crwdstr.ke/60123vKer
Learn how to modify and exploit a Linux Kernel vulnerability to escape container environments, and how CrowdStrike can help to prevent and hunt for similar threats. crwdstr.ke/60103X0Jg
CrowdStrike recently discovered a new exploit method using CVE-2022-41080 and CVE-2022-41082 to achieve remote code execution (RCE) through Outlook Web Access. crwdstr.ke/60123Jq8I
Take a deep dive into wmiexec usage seen from multiple incident response investigations and learn more about the indicators that can help defenders detect wmiexec. ⬇️ crwdstr.ke/6018MJrju
Explore the 4 "capture the flag" challenges in our Targeted Intrusion track of the Adversary Quest 2022: FrontDoor, Backup, Lights Out, Eyes Open. crwdstr.ke/6019MEbz1
Explore the four "capture the flag" challenges in our Hacktivism track of the Adversary Quest 2022: display0, Spellcheck, Password, tokens. crwdstr.ke/6012zAsh2
CrowdStrike's second annual #AdversaryQuest was one for the books!
Special shoutout to the 143 players that made the scoreboard and our 11 players who successfully solved all 3 challenges! These top 50 players will win CrowdStrike swag. ⬇️
#cybersecurity#hacking
585 Followers 492 FollowingHaxor and breaker of things. ⟦#GXPT, #OSCE3, #OSED, #OSEP, #OSWE, #GREM, #OSCE, #GASF⟧; former https://t.co/EIaEyX6c5N; Inactive member of team ALLES! https://t.co/mj2FcRNnwm
205 Followers 609 FollowingDid a Cybersecurity Bachelor and Master in Computer Science with a focus on Security.
Deputy Manager - Cloud Threat Intelligence
Opinion/Thoughts are my own.
200 Followers 1K Followingsecurity research, IoT / embedded defense, bug bounties. once wrote a paper on RE'ing hdds and got job offers from Russia & almost sued in the same week.
74 Followers 929 FollowingStar Trek, Linux, and CTF enthusiast - views are my own. Member of #SpaceBitsRUs . https://t.co/9tQd3dGjiM - @[email protected]
10K Followers 48 FollowingAn open-source declarative framework for building modular AI software. Programming—not prompting—LLMs via higher-level abstractions & optimizers.
5K Followers 633 FollowingHacker, scientist, and most things in between.
PPP (@PlaidCTF) member for life. @theori_io
he/his
maybe at @[email protected]
686 Followers 1K FollowingPhd student at USC | Binary Analysis |EXIntern @Certik | EXIntern @Qualcomm | (ENFJ)
a person who physically lives in LA and mentally in Iran.
17K Followers 348 FollowingHackers On Planet Earth - August 15-17, 2025 - Queens, New York City, USA 🗝💻📻☎️ 🐘:@[email protected] • 🦋:@hope.net • ig/threads:hopeconf
77K Followers 765 FollowingEnd-to-end Cybersecurity consulting team leading the industry, supporting organizations, and giving back. #Hacktheplanet
Blogs, news, webinars, and tools!
3K Followers 917 Followinghttps://t.co/9I6nRUiFjm is a service that provides threat intelligence data about observed network scanning and cyber attacks.
10K Followers 156 Following🐴Pwnie Award Winning & Nation State funded psyop featuring 6 AI Anime Waifus and a Pup™ singing about APTs, Grifters, & Snake Oil in InfoSec
🖤🩷💚💙💜🤍
10K Followers 6K Following@Volatility Core Dev | Art of Memory Forensics co-author | Director of Adversary Tactics @HuntressLabs | #DFIR enthusiast/trainer | [email protected]
347 Followers 46 FollowingThe European Cyber Security Challenge is an initiative by @enisa_eu and aims at enhancing cybersecurity talent across Europe.
999 Followers 26 FollowingA new DC hacker conference: Bringing together builders, breakers, and fixers to do cool shit. 🪩 Year 1: January 24-25, 2026 🪩
https://t.co/qYKu4hl0Uj
2K Followers 1K FollowingPhD by @uc3m, I do things with compilers at QShield (@Quarkslab), co-author of 'Fuzzing against the machine', also RE and programming. English, Español, 日本語.