Piosky (@piosky1) 's Twitter Profile
Piosky

@piosky1

ID: 788777070428028928

linkhttps://piosky.fr calendar_today19-10-2016 16:21:23

642 Tweet

115 Takipçi

111 Takip Edilen

Martin Sohn (@martinsohndk) 's Twitter Profile Photo

Our latest post explains how a TRUSTED forest/domain can be compromised by a TRUSTING forest/domain (a one-way trust). Thanks to Will Schroeder whose question inspired us, to 📔 Michael Grafnetter & @JosephRyanRies for Keys container info, and to Yuval Gordon for GoldenGMSA. improsec.com/tech-blog/sid-…

Justin Bui (@slyd0g) 's Twitter Profile Photo

Took some time recently to dive into in-memory Mach-O execution on macOS. I dig into the API calls necessary to perform reflective code loading, present my Swift implementation, cover nuances on Big Sur vs Monterey, and how to detect it on Monterey! slyd0g.medium.com/understanding-…

Will Schroeder (@harmj0y) 's Twitter Profile Photo

My second post in my adversarial ML series "Learning Machine Learning Part 2: Attacking White Box Models" is now up at posts.specterops.io/learning-machi… and the Invoke-Evasion repo has been updated with the Jupyter notebooks/samples from the post github.com/GhostPack/Invo…

Oliver Lyak (@ly4k_) 's Twitter Profile Photo

The first blog post is here. This one covers the technical details of CVE-2022-26923 (Active Directory Domain Services Elevation of Privilege Vulnerability). The vulnerability was patched as part of the May 2022 Security Updates from Microsoft. research.ifcr.dk/9e098fe298f4

Thomas Graf 🐝 (@tgraf__) 's Twitter Profile Photo

Today, we are open sourcing Tetragon after several years of development. eBPF-based Security Observability & Runtime Enforcement. isovalent.com/blog/post/2022…

Will Schroeder (@harmj0y) 's Twitter Profile Photo

In my first foray into what moo terms "Offensive ML", I took at shot at data mining documents for passwords using deep learning. You can read about the approach at posts.specterops.io/deeppass-findi… and can find the notebook + Dockerized model at github.com/GhostPack/Deep…

Christophe Tafani-Dereeper (@christophetd) 's Twitter Profile Photo

Securing an AWS environment can feel overwhelming. I'm a big believer in threat-informed defense, looking at how companies get hacked on AWS to prioritize the security investments. Check out my (beginner-friendly) talk: docs.google.com/presentation/d…

Securing an AWS environment can feel overwhelming.

I'm a big believer in threat-informed defense, looking at how companies get hacked on AWS to prioritize the security investments.

Check out my (beginner-friendly) talk:  docs.google.com/presentation/d…
Adrian Cantrill (@adriancantrill) 's Twitter Profile Photo

I've just opened early access for my AWS Security Specialty course (details on this thread reddit.com/r/AWSCertifica…) direct link to the course learn.cantrill.io/p/aws-certifie… and a new bundle learn.cantrill.io/p/aws-security… - new demos/lessons coming - Please Retweet #100daysofcloud #labEveryday

I've just opened early access for my AWS Security Specialty course (details on this thread reddit.com/r/AWSCertifica…) direct link to the course learn.cantrill.io/p/aws-certifie… and a new bundle learn.cantrill.io/p/aws-security… - new demos/lessons coming - Please Retweet

#100daysofcloud #labEveryday
Will Schroeder (@harmj0y) 's Twitter Profile Photo

Hey, do you like tokens? Have you always wanted to "harvest" tokens for offensive purposes? If so check out my new post posts.specterops.io/koh-the-token-… where I show I can (finally) write a technical post without memes, and then check out the Koh toolset at github.com/GhostPack/Koh

Andy Robbins (@_wald0) 's Twitter Profile Photo

Right on the heels of the #BloodHound 4.2 release, I am also very proud to announce to release of the BloodHound Attack Research Kit, aka BARK! ✅ - Azure abuse primitive examples ✅ - Azure token juggling functions ✅ - NO dependencies Get BARK here: github.com/BloodHoundAD/B…

Right on the heels of the #BloodHound 4.2 release, I am also very proud to announce to release of the BloodHound Attack Research Kit, aka BARK!

✅ - Azure abuse primitive examples
✅ - Azure token juggling functions
✅ - NO dependencies

Get BARK here: github.com/BloodHoundAD/B…
Piosky (@piosky1) 's Twitter Profile Photo

It was time for a change! My personal website has migrated to #Cloudflare Pages and #Docusaurus giving it a fresh new look and even more content for you to check out. piosky.fr

Petko D. Petkov (@pdp) 's Twitter Profile Photo

chatbotkit.com - a powerful platform that makes it easy to build chatbots that can communicate with users in natural language. With features like custom datasets, skillsets, and integration with LLM, your chatbot will be more powerful than ever before. #gpt3 #ChatGPT

chatbotkit.com - a powerful platform that makes it easy to build chatbots that can communicate with users in natural language. With features like custom datasets, skillsets, and integration with LLM, your chatbot will be more powerful than ever before. #gpt3 #ChatGPT
Thinkst Canary (@thinkstcanary) 's Twitter Profile Photo

Jacob Torrey on stage at ShmooCon just released our new Credit Card Canarytoken. 1) Visit canarytokens.org to create ur own legit credit-card; 2) Place it in a data-store of your choice; 3) Get an alert when an attacker runs that card! Read more: blog.thinkst.com/2023/01/swipe-…

Jacob Torrey on stage at <a href="/shmoocon/">ShmooCon</a> just released our new Credit Card Canarytoken.

1) Visit canarytokens.org to create ur own legit credit-card;
2) Place it in a data-store of your choice;
3) Get an alert when an attacker runs that card!

Read more:
blog.thinkst.com/2023/01/swipe-…
Marco Lancini (@lancinimarco) 's Twitter Profile Photo

🔖 Zero Trust Access to Private Webapps on AWS ECS with Cloudflare Tunnel How to use Cloudflare Tunnel to securely access a Flask webapp running in a private subnet in ECS on Fargate, without exposing the app to the public internet. blog.marcolancini.it/2023/blog-clou…

ChatBotKit (@chatbotkit) 's Twitter Profile Photo

ChatBotKit customers can now view logs and events associated with their bots and integrations, providing full transparency on how they operate. Troubleshoot problems more effectively and gain valuable insights with ChatBotKit's new feature. chatbotkit.com/changelog/chat…

Piosky (@piosky1) 's Twitter Profile Photo

Thrilled to share my latest blog post on "Runtime Security for AWS EKS", showcasing the findings from my R&D work! piosky.fr/blog/runtime-s…