A while back I was curious about the access check that occurs when someone tries to consume from the Threat-Intelligence ETW provider. I decided to write a short blog on the topic.
jonny-johnson.medium.com/peeling-back-t…
Muchos equipos siguen tomando decisiones de arquitectura como si fueran notas al aire.
Se habla, se acuerda… y se olvida.
ADR (Architecture Decision Records).
#ADR#arquitectura
I just wrote about Windows User-Mode Heap Exploitation.
mrt4ntr4.github.io/Windows-Heap-E…
Based on a HitconCTF challenge by @scwuaptx, it walks through exploiting a heap overflow vulnerability and abusing file-structure corruption to achieve arbitrary read/write! Hope you like it 🍻
💡 C2 Channels Are The Hidden Communication Lines Behind Modern Cyberattacks
hunt.io/glossary/c2-ch…
C2 Channels are the invisible backbone that allow attackers to turn a single compromised host into an active staging ground for espionage, data theft, or ransomware.
Detecting…
🚨Here is my latest research at @EclecticIQ: ShinyHunters teamed up with Scattered Spider to conduct vishing attacks targeting cloud application users, bribing employees for insider access and targeting CI/CD tools for supply chain attacks.
🔗blog.eclecticiq.com/shinyhunters-c…
I did a writeup on exploiting the ASIO64.sys driver that was fuzzed from @vxunderground's vulnerable driver project. Nothing novel or complex, but I had fun writing the exploit:
bad-jubies.github.io/exploiting-asi…
What is Beaconator C2?
w/ @Shammahwoods introducing a C2 framework and set of adversarial emulation tools at @defcon demo labs to provide a robust management console with a wide range of beacon payloads, including payload options for win/MacOS/Linux.
github.com/CroodSolutions…
What is Beaconator C2?
w/ @Shammahwoods introducing a C2 framework and set of adversarial emulation tools at @defcon demo labs to provide a robust management console with a wide range of beacon payloads, including payload options for win/MacOS/Linux.
github.com/CroodSolutions… https://t.co/T7SiHpCdkw
Apple just dropped a killer open-source visualization tool for embeddings — Embedding Atlas — and it’s surprisingly powerful for anyone working with large text+metadata datasets.
This reminds me of Nomic's Atlas, but I never got around to using it 😅
We’re talking real-time…
we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us use them to dump full crm records
these are autonomous agents.. no human in the loop
#DEFCON#BHUSA@tamirishaysh
I finished early and added another tool to my website!
➡️powershellforhackers.com/tools/psinpic/
This tool allows you to hide any payload in the pixels of an image and then generates a short code snippet for you to extract and execute it
This means you can generate an obfuscated reverse shell…
This site is amazing for learning Go concurrency patterns: concurrency.rocks
The concept is simple, but the UI is both sleek and well-designed. Even better, it uses Go WebAssembly, so there’s no need for a server.
I've had something in my mind now for a few years, but I never published it. So today, you're getting a short thread on "How to Prepare for #ThreatHunting Using the ABLE Framework".
1/9
obfus.h is the very powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity#Obfuscation#infosecgithub.com/DosX-dev/obfus…
For you interested in JS exploitation I have started a series dissecting as much as possible current state of the art. We are looking for you at fuzzsociety.org
Lesson + Linux based container
youtu.be/m9c8J1Ysk5A
Slides
bit.ly/3GNIoGd
2K Followers 4K FollowingBlack Widow of AppSec | Pro nap taker | Plant-based🥕 A Cybermaiden who likes coding, motorsport, legos & sneakers #DOWELOOKLIKEHACKERS
676 Followers 980 FollowingUnit 42 | Creator of DFIR Labs | Former Captain @teambi0s | DFIR |
Malware Analyst | Maldev | Windows RE | Trounce🦇 | Views My Own
8K Followers 1K FollowingWe provide technology that empowers organizations to reimagine cybersecurity & protect what matters #SaaS #DigitalRiskManagement #CyberThreatIntelligence
0 Followers 72 FollowingProfessor Arthur and his team provide cryptocurrency market analysis and earn $500 to $5,000 per day. Click to join WA:https://t.co/1IiipdaMqF
4K Followers 706 FollowingElastic Security Labs is democratizing security by sharing knowledge and capabilities necessary to prepare for threats. Spiritually serving humanity since 2019.
4K Followers 393 FollowingDigital Forensics and incident response software for endpoint investigation. Built by @sleuthkitlabs and Brian Carrier (@carrier4n6).
2K Followers 4K FollowingBlack Widow of AppSec | Pro nap taker | Plant-based🥕 A Cybermaiden who likes coding, motorsport, legos & sneakers #DOWELOOKLIKEHACKERS
20K Followers 4K FollowingAstro by Astronomer is the leading unified DataOps platform. Powered by #ApacheAirflow, Astro accelerates building reliable data products for production AI.
9K Followers 820 FollowingExperts in Network Forensics and Network Security Monitoring. Creators of #NetworkMiner, #CapLoader, #PacketCache, #PolarProxy and #RawCap.
378K Followers 531 FollowingSoy cantante 🎵.S3x Icon🇲🇽Top 0.2% en 0nIy, averigua el por qué. Mi música: @larimarysuvoz 🎵. Sígueme en mi cuenta secundaria🙏🏻: @giakushforlife
2K Followers 17 FollowingBlackstorm Security is a highly specialized company on exploit development, reverse engineering, malware analysis and threat hunting.
666 Followers 14 FollowingThe first con dedicated to exploring the offensive use of AI.
Agenda: https://t.co/OnaPkgpS5T
Oct 5-8, 2025 | Oceanside, CA
#OffensiveAICon
685 Followers 656 FollowingDad ⚭ Husband
𒉭 Azure Security | DE&TH | IAM
🏕️🥾 Catch me outside
🏋️♂️CultoftheIron
What stands in the way, becomes the way
48K Followers 2K FollowingSpecializing in pen testing, red teaming, and Active SOC. We share our knowledge through blogs, webcasts, open-source tools, and Backdoors & Breaches game.
3K Followers 2K FollowingSecurity Bene Gesserit and professional nerd stalker. Likes long walks in hubsites and searching for spice. Views: definitely those of my puppet overlords.
10K Followers 980 FollowingSenior Security Research Engineer @Elastic / BlackHat USA & Asia Review Board / CTF for GIRLS / 著書『サイバー攻撃』/ サイバーセキュリティに関する総務大臣奨励賞 / My tweets are my own opinion
27K Followers 1K FollowingAuthor of "Automate the Boring Stuff with Python" and other programming books. This account is just promo stuff now, follow me on Mastodon. he/him
No recent Favorites. New Favorites will appear here.