Martin Gallo 🇦🇷 💚✊🏾🚀 (@martingalloar) 's Twitter Profile
Martin Gallo 🇦🇷 💚✊🏾🚀

@martingalloar

InfoSec Leader/Innovation | 👨🏾‍💻PdM @HYPRCorp | 🙆Co-org @TandilSec | 🧐CFP @ekoparty | ✊Knowledge sharing and community building | 🏀#12 | 🗨️Words are mine

ID: 17143251

linkhttps://www.linkedin.com/in/mgallo/ calendar_today03-11-2008 23:06:51

2,2K Tweet

1,1K Takipçi

500 Takip Edilen

duiaUnicen (@duiaunicen) 's Twitter Profile Photo

📢 ¡Se vienen dos charlas imperdibles! 🔹 IA y periodismo con Joaquín Saralegui 🔹 Agentes de IA en procesos productivos con Andrés Diaz Pace 🗓️ 27 y 28/6 · Modalidad virtual · Abiertas al público 📩 Inscribite: forms.gle/4DncWjKwTK6JN9… #IA #DUIA

📢 ¡Se vienen dos charlas imperdibles!
🔹 IA y periodismo con Joaquín Saralegui
🔹 Agentes de IA en procesos productivos con Andrés Diaz Pace 
🗓️ 27 y 28/6 · Modalidad virtual · Abiertas al público
📩 Inscribite: forms.gle/4DncWjKwTK6JN9…
#IA #DUIA
Fernando Schapachnik (@fschapachnik) 's Twitter Profile Photo

Balance de 4 años al frente de la Fundación Sadosky y otros 10 un poco más atrás. Terminó una etapa en la Fundación Sadosky y quiero compartir algunas reflexiones y un balance de lo realizado. bit.ly/4k1g54o

Pwnie Awards (@pwnieawards) 's Twitter Profile Photo

We are very happy to announce the nominees for the 2025 Pwnie Awards! As a reminder, we will be presenting the winners at DEF CON this year. Saturday the 9th, 10:00AM Main Stage. Hope to see you there! docs.google.com/document/d/1fy…

CICADA8Research (@cicada8research) 's Twitter Profile Photo

Hi Friends! We continue our series of articles about RPC and impacket. In the second part, we looked at tools that can be used to analyze RPC servers, and also examined RPC security issues : ) cicada-8.medium.com/impacket-devel…

Martin Gallo 🇦🇷 💚✊🏾🚀 (@martingalloar) 's Twitter Profile Photo

The CFP for EkoParty is still open until this Friday! If you’ve done any recent research and haven’t submitted yet, please do so. -- El CFP para la EkoParty está abierto hasta este Viernes. Si hiciste alguna investigación recientemente y todavía no la enviaste, por favor hacelo!

Ekoparty | Hacking everything (@ekoparty) 's Twitter Profile Photo

Te presentamos al Comité que seleccionó las charlas del MainTrack de la #EKO2025. 🔥🧵 Muy pronto te revelamos el track completo. 🫣

Te presentamos al Comité que seleccionó las charlas del MainTrack de la #EKO2025. 🔥🧵

Muy pronto te revelamos el track completo. 🫣
Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…

Daniel Genkin (@danielgenkin) 's Twitter Profile Photo

Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at wiretap.fail

Want to know what happens when commercial TEEs meet improvised DRAM memory interposers? SGX mayhem including attestation key extraction. Please DO try that at home😉. Check out our work at wiretap.fail
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog What are some effective ways to abuse Kerberos delegation remotely? Abusing Delegation with Impacket (Part 1): Unconstrained Delegation by: Hunter Wade (Cross-Posted) Published: 11/5/2025 Learn more: blackhillsinfosec.com/abusing-delega…

**NEW** BHIS | Blog
What are some effective ways to abuse Kerberos delegation remotely?

Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
by: Hunter Wade (Cross-Posted)
Published: 11/5/2025
Learn more:  blackhillsinfosec.com/abusing-delega…
clonan (@soldanisman) 's Twitter Profile Photo

¡Ya podés descargar el fanzine #3 de Actualidad Cyberciruja | Attualitá Warpa! nextcloud.cybercirujas.club/s/aRXQZM7YipLr… Si te interesa recibir copias físicas de este número y los anteriores, escribime que hacemos envíos :)

¡Ya podés descargar el fanzine #3 de Actualidad Cyberciruja | Attualitá Warpa!

nextcloud.cybercirujas.club/s/aRXQZM7YipLr…

Si te interesa recibir copias físicas de este número y los anteriores, escribime que hacemos envíos :)
Black Hills Information Security (@bhinfosecurity) 's Twitter Profile Photo

**NEW** BHIS | Blog "There are two types of constrained delegation - with and without protocol transition. The key difference is how the impersonation is done." Abusing Delegation with Impacket (Part 2): Constrained Delegation by: Hunter Wade Published: 11/12/2025 Learn more:

**NEW** BHIS | Blog
"There are two types of constrained delegation - with and without protocol transition. The key difference is how the impersonation is done."

Abusing Delegation with Impacket (Part 2): Constrained Delegation
by: Hunter Wade
Published: 11/12/2025
Learn more:
CICADA8Research (@cicada8research) 's Twitter Profile Photo

Hi friends! I've finally written the third part of the Impacket Programming Guide! We explored several MSRPC protocols and also created our own tool for Lateral Movement! Read on medium: medium.com/@cicada-8/impa… POC: github.com/CICADA8-Resear…

Hi friends! I've finally written the third part of the Impacket Programming Guide! We explored several MSRPC protocols and also created our own tool for Lateral Movement! Read on medium:

medium.com/@cicada-8/impa…

POC: github.com/CICADA8-Resear…
Sean Heelan (@seanhn) 's Twitter Profile Photo

Blog post: On the Coming Industrialisation of Exploit Generation with LLMs sean.heelan.io/2026/01/18/on-… TL;DR: I ran an experiment with GPT-5.2 and Opus 4.5 based agents to generate exploits for a zeroday QuickJS bug. They're pretty good at it. Code: github.com/SeanHeelan/ana…