#Pwn (@0xn3_) 's Twitter Profile
#Pwn

@0xn3_

10x Full stack pwnr 🎇. | Intrested in Browser, Kernal, Virtualisation 💤

ID: 3233129702

calendar_today02-06-2015 03:23:29

323 Tweet

83 Takipçi

922 Takip Edilen

NULLCON (@nullcon) 's Twitter Profile Photo

🤩A fantastic opportunity to be the first list of speakers with innovative research for Nullcon's 1st ever Berlin edition 🙌 Forms for each categories of your Talk, Workshop, CTF, Open source 👊Submit your research➡️bit.ly/3CDsg1T #NullconBerlin2022 #CFP

🤩A fantastic opportunity to be the first list of speakers with innovative research for Nullcon's 1st ever Berlin edition

🙌 Forms for each categories of your Talk, Workshop, CTF, Open source

👊Submit your research➡️bit.ly/3CDsg1T

#NullconBerlin2022 #CFP
Deutsche Telekom CERT (@dtcert) 's Twitter Profile Photo

🚨⚠️New #0-day vulnerability tracked under "Log4Shell" and CVE-2021-44228 discovered in Apache Log4j 🌶️‼️ We are observing attacks in our honeypot infrastructure coming from the TOR network. Find Mitigation instructions here: lunasec.io/docs/blog/log4…

🚨⚠️New #0-day vulnerability tracked under "Log4Shell" and CVE-2021-44228 discovered in Apache Log4j 🌶️‼️ We are observing attacks in our honeypot infrastructure coming from the TOR network. Find Mitigation instructions here: lunasec.io/docs/blog/log4…
Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

🍎👾 Just published my annual "Mac Malware of the Year" report, for 2021: objective-see.com/blog/blog_0x6B… An in-depth technical analysis of the year's new Mac malware, covering each: 💉 Infection vector 💾 Persistence mechanism 🛰 Payload and capabilities + samples for download! 🦠

ThreatDown (@threat_down) 's Twitter Profile Photo

ℹ️ Our latest blog covers #Lazarus Group in their most recent campaign. 🚨 New techniques 🚨 ➡️ KernelCallbackTable to hijack control flow and shellcode execution ➡️ Windows Update client for malicious code execution ➡️ GitHub for C2 communication blog.malwarebytes.com/threat-intelli…

NULLCON (@nullcon) 's Twitter Profile Photo

⚡Next-Gen security professionals 🙌 Nullcon in collaboration with Intigriti has come up with a Student Scholarship Opportunity 😎Fill up the form & increase your chances to get selected➡️bit.ly/nullconintigri… #NullconBerlin2022 #Infosec #bugbounty #intigriti

⚡Next-Gen security professionals 🙌 Nullcon in collaboration with <a href="/intigriti/">Intigriti</a> has come up with a Student Scholarship Opportunity 

😎Fill up the form &amp; increase your chances to get selected➡️bit.ly/nullconintigri…

#NullconBerlin2022 #Infosec #bugbounty #intigriti
vx-underground (@vxunderground) 's Twitter Profile Photo

We have downloaded and archived everything shared by conti leaks thus far. - Chat logs 2020 - 2022 - Internal software source code - Jabber chat logs 2021 - 2022 - Pony leak - Rocket Chat logs - Screenshots, December 2021 - Trickbot forum Download: share.vx-underground.org

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

PostDump. tool to perform a memory dump (lsass) using several technics to bypass EDR hooking and lsass protection github.com/post-cyberlabs…

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Very intriguing report from Pangu Lab about advanced, allegedly NSA's, top-tier backdoor - Bvp47. Features are indeed impressive. The last screenshot is very telling. source: pangulab.cn/files/The_Bvp4… #ShadowBrokers #EquationGroup

Very intriguing report from Pangu Lab about advanced, allegedly NSA's, top-tier backdoor - Bvp47. Features are indeed impressive.
The last screenshot is very telling.

source: pangulab.cn/files/The_Bvp4…

#ShadowBrokers #EquationGroup
Anastasios Pingios (@xorlgr) 's Twitter Profile Photo

Just updated DPRK's APT groups too, mainly based on the latest Mandiant publication. Changes: Added the 6 Bureaus and assigned Mandiant/FireEye's APT groups as they attributed them in their post. xorl.wordpress.com/2021/04/24/nor…

NULLCON (@nullcon) 's Twitter Profile Photo

💥We have a 'Secret' & only Stok✌️ STÖK ✌️ knows about it!😎 😉Can you guess? 💬Drop in the comments section 👊Meet us on Stok's 'Bounty Thursdays' Live on 31st March Stay Tuned▶️youtube.com/c/STOKfredrik #Nullcon #bountythursdays #infosec #Conference #Cybersecurity

💥We have a 'Secret' &amp; only Stok✌️ <a href="/stokfredrik/">STÖK ✌️</a> knows about it!😎

😉Can you guess? 💬Drop in the comments section

👊Meet us on Stok's 'Bounty Thursdays' Live on 31st March

Stay Tuned▶️youtube.com/c/STOKfredrik

#Nullcon #bountythursdays #infosec #Conference #Cybersecurity
✞ inversecos (@inversecos) 's Twitter Profile Photo

Russian #APTs are still abusing Cisco SMIs and modifying router configurations to export info out via FTP. Make sure you’re monitoring for untrusted connections to management protocols on network devices… or get rid of SMI…

LetsDefend (@letsdefendio) 's Twitter Profile Photo

You can investigate the #Follina incident as a SOC analyst for free. We prepared a SIEM alert about CVE-2022-30190 in the SOC environment Investigation: letsdefend.io

You can investigate the #Follina incident as a SOC analyst for free. We prepared a SIEM alert about CVE-2022-30190 in the SOC environment

Investigation: letsdefend.io
Andy Nguyen (@theflow0) 's Twitter Profile Photo

bd-jb: Blu-ray Disc Java Sandbox Escape affecting PS3, PS4, PS5. My talk at hardwear.io will be uploaded in a few weeks. #hardwear_io hackerone.com/reports/1379975

vx-underground (@vxunderground) 's Twitter Profile Photo

We just pitched a movie idea to Warner Brothers Pictures. It's a cutting edge movie about a Malware Developer - a psychological thriller. The movie is 180 minutes of nothing but a chronically depressed man trying to get his code to compile.

ςεяβεяμs - мαℓωαяε яεsεαяςнεя (@c3rb3ru5d3d53c) 's Twitter Profile Photo

#Malware Analysis and #Reverse #Engineering Workflow Guide. 👩‍🏫 ✅ Establishing a Methodology ✅ Detection ✅ Process Graph ✅ Tips and Tricks ✅ Malicious Intent ✅ Triage ✅ Types of Analysis ✅ Additional Resources I hope you all enjoy! 😘 c3rb3ru5d3d53c.github.io/documents/malw…

#Malware Analysis and #Reverse #Engineering Workflow Guide. 👩‍🏫

✅ Establishing a Methodology
✅ Detection
✅ Process Graph
✅ Tips and Tricks
✅ Malicious Intent
✅ Triage
✅ Types of Analysis
✅ Additional Resources

I hope you all enjoy! 😘

c3rb3ru5d3d53c.github.io/documents/malw…