Jose Enrique Hernandez (@_josehelps) 's Twitter Profile
Jose Enrique Hernandez

@_josehelps

🛡️ Threat Research Director @Splunk ❤️ Scuba Diving 🔧 Maintainer of #AtomicRedTeam & #LOLDRIVERS

ID: 14096970

linkhttps://www.josehelps.com calendar_today07-03-2008 20:09:41

4,4K Tweet

3,3K Takipçi

1,1K Takip Edilen

The Haag™ (@m_haggis) 's Twitter Profile Photo

Grateful that a community project like LOLRMM went from this weekend hackathon to full blown project now mentioned by CISA: cisa.gov/news-events/cy…

Mitchell Hashimoto (@mitchellh) 's Twitter Profile Photo

Be wary of people who spew AI hype and screenshot their army of agents but don't seem to be shipping anything but demos. I'm a big fan of AI assistance and use agents and chat everyday, but there's a ton of engagement farming happening out there.

Red Canary (@redcanary) 's Twitter Profile Photo

Want to truly test your defenses? 🛡️ Atomic Red Team offers simple, executable tests mapped directly to MITRE ATT&CK® techniques — for free! 💪 These vital resources help you: ✅ Set up your test environment. 🔍 Browse tests for Windows, macOS, Linux, & cloud. 🧪 Execute

Want to truly test your defenses? 🛡️ Atomic Red Team offers simple, executable tests mapped directly to MITRE ATT&CK® techniques — for free! 💪

These vital resources help you:

✅ Set up your test environment.

🔍 Browse tests for Windows, macOS, Linux, & cloud.

🧪 Execute
Magic Sword (@magicswordio) 's Twitter Profile Photo

LOLRMM.io now tracks over 290 RMMs, with new ones being added regularly. These tools provide legitimate functionality but are frequently repurposed by attackers. Read here: buff.ly/oNbWfa6 If you're not using them in your setup, why allow them to run?

LOLRMM.io now tracks over 290 RMMs, with new ones being added regularly. These tools provide legitimate functionality but are frequently repurposed by attackers. Read here: buff.ly/oNbWfa6 

If you're not using them in your setup, why allow them to run?
Chris Spehn (@conscioushacker) 's Twitter Profile Photo

If you didn't see it, check out the llm payload generation research from Kyle Avery . The best research I've seen in the offensive security AI space. I'm probably biased, but it shows what's possible. outflank.nl/blog/2025/08/0…

ANY.RUN (@anyrun_app) 's Twitter Profile Photo

🚨 How #Rhadamanthys Stealer Slips Past Defenses using ClickFix ⚠️ Rhadamanthys is now delivered via ClickFix, combining technical methods and social engineering to bypass automated security solutions, making detection and response especially challenging. 👾 While earlier

🚨 How #Rhadamanthys Stealer Slips Past Defenses using ClickFix
⚠️ Rhadamanthys is now delivered via ClickFix, combining technical methods and social engineering to bypass automated security solutions, making detection and response especially challenging.
👾 While earlier
Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I’m excited to announce two major upgrades in our free product line: 📦 Archive scanning is now unlocked in THOR Lite - including docx, xlsx, jar, war, and more 🧠 YARA Forge (my own project) is now integrated – extends the detection coverage with open source rules 🔍 Also

Jose Enrique Hernandez (@_josehelps) 's Twitter Profile Photo

LOLdrivers.io now has SIEM queries and a tool section for those looking to operationalize the data. Thanks to Mehmet Ergene and The Haag™ for sharing the queries with the community! Also shout out to Tenable for sharing the Nessus plugin, Oddvar Moe for the

LOLdrivers.io now has SIEM queries and a tool section for those looking to operationalize the data. Thanks to <a href="/Cyb3rMonk/">Mehmet Ergene</a> and <a href="/M_haggis/">The Haag™</a> for sharing the queries with the community! 

Also shout out to <a href="/TenableSecurity/">Tenable</a> for sharing the Nessus plugin, <a href="/Oddvarmoe/">Oddvar Moe</a> for the
Nasreddine Bencherchali (@nas_bench) 's Twitter Profile Photo

[New Blog 📚] The Fragile Balance: Assumptions, Tuning, and Telemetry Limits In Detection Engineering If you ever struggle with false positives and the idea of tuning detections. This is for you. Read More - nasbench.medium.com/the-fragile-ba…

[New Blog 📚] The Fragile Balance: Assumptions, Tuning, and Telemetry Limits In Detection Engineering

If you ever struggle with false positives and the idea of tuning detections. This is for you.

Read More - nasbench.medium.com/the-fragile-ba…
bohops (@bohops) 's Twitter Profile Photo

It's just not a good market for app control bypass research these days, so I moved on to researching other things no one cares about.

spencer (@techspence) 's Twitter Profile Photo

Attackers know how to find your weak and misconfigured Applocker rules. Now you can too.... 🧵Just finished putting together a new tool to find weak and misconfigured AppLocker policies. It’s called AppLocker Inspector. Here’s how this tool came to be and what it does that’s

Attackers know how to find your weak and misconfigured Applocker rules. Now you can too....

🧵Just finished putting together a new tool to find weak and misconfigured AppLocker policies.

It’s called AppLocker Inspector.

Here’s how this tool came to be and what it does that’s
Cisco Talos Intelligence Group (@talossecurity) 's Twitter Profile Photo

Cisco Talos’ latest blog exposes Static Tundra, a Russian state-sponsored group targeting unpatched Cisco devices for long-term espionage worldwide. Apply the patch now and protect your network: cs.co/6018fvA0O

Cisco Talos’ latest blog exposes Static Tundra, a Russian state-sponsored group targeting unpatched Cisco devices for long-term espionage worldwide. Apply the patch now and protect your network: cs.co/6018fvA0O