C Sto (@c__sto) 's Twitter Profile
C Sto

@c__sto

Sarcastic wannabe hacker. Professional ‘I wonder what would happen if I’-er

ID: 30213597

calendar_today10-04-2009 13:19:39

2,2K Tweet

637 Followers

461 Following

Ryan Castellucci (@ryancdotorg) 's Twitter Profile Photo

@StarkatSecurity @splendid_hf Cybergibbons 🚲🚲🚲 Much of hacking is about understanding systems better than those who built them, and using that knowledge to do what is supposed to be "impossible".

C Sto (@c__sto) 's Twitter Profile Photo

I’m a little concerned that the weather for Kawaiicon is going to trick everyone into thinking that this is what a Wellington winter is like

elttam (@elttam) 's Twitter Profile Photo

New blog post: Golang code review notes - A quick summary of some of the bug classes in Go elttam.com/blog/golang-co…

WACTF (@capture_tf) 's Twitter Profile Photo

The good people at PentesterLab have again given us 8x 12 month, 8x 3 month and then also a bunch of one month subscriptions for prizes and giveaways through #WACTF! 🙏🙏🙏

Moloch (@littlejoetables) 's Twitter Profile Photo

This is gonna be a “won’t fix” from us, so will be a reliable signal for threat hunting. If you expose your control interfaces you deserve to get a caught :-)

Dylan Tran (@d_tranman) 's Twitter Profile Photo

Thanks to a lot of help from C Sto and his BananaPhone repo, I was able to get indirect syscalls to work in go! github.com/susMdT/go-indi…

Thanks to a lot of help from <a href="/C__Sto/">C Sto</a> and his BananaPhone repo, I was able to get indirect syscalls to work in go! github.com/susMdT/go-indi…
Joe Cutler (@alpha_convert) 's Twitter Profile Photo

My advisor is buying me a new laptop. I just learned that the delivery is going to be intercepted by Penn so they can “set up the machine”. I pressed, and they said they were installing spyware software called CrowdStrike.

Exclusive (@me0wday) 's Twitter Profile Photo

We were looking at Home Assistant as a team recently and identified a Critical pre-auth vuln that led to RCE (CVE-2023-27482), have a read of the discovery process and details #homeassistant #CVE

l0ss (@mikeloss) 's Twitter Profile Photo

From the top: Snaffler not Snaffle, they didn't mention Princess of PowerShell , it isn't an AD audit tool, it doesn't help with "collection analysis and reporting" of pentest data, it's still not called snaffle, it's not especially user friendly, it doesn't collect network and system (1/n)

Fletcher Davis (@gymr4t) 's Twitter Profile Photo

Operational security is always a big topic in the information security industry, but I doubt most red team consulting firms consider the importance of program security. Tooling and techniques leveraged in one operation can directly affect the security and success of another