Co11ateral (@co11ateral) 's Twitter Profile
Co11ateral

@co11ateral

Tech writer at Hackers-Arise | DFIR | Former Ukrainian Cyber Forces

ID: 2012546161802903552

calendar_today17-01-2026 15:24:19

181 Tweet

1,1K Takipçi

43 Takip Edilen

OccupytheWeb (@three_cube) 's Twitter Profile Photo

The Government and Verizon, ATT, and T-Mobile don't want you to know that you can create your own private cellular network! hackers-arise.com/sdr-signals-in…

The Government and Verizon, ATT, and T-Mobile don't want you to know that you can create your own private cellular network!

hackers-arise.com/sdr-signals-in…
OccupytheWeb (@three_cube) 's Twitter Profile Photo

When I did this video nearly a year ago, some people laughed and others scoffed. Turns out that 2025 was the worst year in history for VPN and Router security! They aren't laughing now. They looking for job! Are VPNs even safe now? Hacker Explains youtu.be/Qqd9KzPVBb8?si… via

Co11ateral (@co11ateral) 's Twitter Profile Photo

LOLRMM A curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors Earlier we published an article on AnyDesk forensics. RMM tools are often overlooked and their logs aren’t monitored. Hackers can create hidden local admins

LOLRMM 

A curated list of Remote Monitoring and Management (RMM) tools that could potentially be abused by threat actors

Earlier we published an article on AnyDesk forensics. RMM tools are often overlooked and their logs aren’t monitored. Hackers can create hidden local admins
OccupytheWeb (@three_cube) 's Twitter Profile Photo

Everything You Need to Get Started In Cybersecurity! Until March 1 includes our exclusive VPN and Router Hacking ($199 value). In addition, one lucky purchaser will receive our 3-year Subscriber package ($1500 value) hackersarise.thinkific.com/bundles/cybers…

Co11ateral (@co11ateral) 's Twitter Profile Photo

More Powershell scripts for #blueteam were covered. This time we looked at Audit.ps1 by mRr3b00t for thorough endpoint analysis, and ADACLScan.ps1 for identifying DACL attacks, which also supports comparing ACLs against a baseline. Especially helpful since DACL changes are

More Powershell scripts for #blueteam were covered. This time we looked at Audit.ps1 by <a href="/UK_Daniel_Card/">mRr3b00t</a> for thorough endpoint analysis, and ADACLScan.ps1 for identifying DACL attacks, which also supports comparing ACLs against a baseline. Especially helpful since DACL changes are
Co11ateral (@co11ateral) 's Twitter Profile Photo

Overpass Turbo Another tool for critical infrastructure mapping that can be used for #cyberwar intelligence gathering. All these substations, transformers, towers, plants, and cameras are crowdsourced. There is a lot more under the hood hackers-arise.com/open-source-in… OccupytheWeb

Overpass Turbo

Another tool for critical infrastructure mapping that can be used for #cyberwar intelligence gathering. All these substations, transformers, towers, plants, and cameras are crowdsourced. There is a lot more under the hood

hackers-arise.com/open-source-in…

<a href="/three_cube/">OccupytheWeb</a>
Olexander (@_aircorridor) 's Twitter Profile Photo

PowerShell for DFIR, Part 3: Audits and ACL Security Move from reactive cleanup to proactive control: hackers-arise.com/powershell-for… OccupytheWeb Di Smouk Co11ateral

PowerShell for DFIR, Part 3: Audits and ACL Security

Move from reactive cleanup to proactive control:
hackers-arise.com/powershell-for…
<a href="/three_cube/">OccupytheWeb</a> <a href="/DI0256/">Di</a> <a href="/IamSmouk/">Smouk</a> <a href="/co11ateral/">Co11ateral</a>
☢️Smouk☢️ (@iamsmouk) 's Twitter Profile Photo

I’m genuinely surprised at how many professionals do little to no deep exploration into cryptography, considering it is one of the most critical domains when it comes to securing systems and is practically embedded everywhere. I’m not saying we all need to become cryptographers,

I’m genuinely surprised at how many professionals do little to no deep exploration into cryptography, considering it is one of the most critical domains when it comes to securing systems and is practically embedded everywhere.

I’m not saying we all need to become cryptographers,
Olexander (@_aircorridor) 's Twitter Profile Photo

SCADA Hacking: Inside Russian Facilities, Part 4 Hackers have drastically affected entire neighborhoods in St. Petersburg by disabling heating systems, leaving residents without warmth. Cyberwar in action: hackers-arise.com/scada-hacking-… OccupytheWeb Di Smouk Co11ateral

SCADA Hacking: Inside Russian Facilities, Part 4

Hackers have drastically affected entire neighborhoods in St. Petersburg by disabling heating systems, leaving residents without warmth. 

Cyberwar in action:
hackers-arise.com/scada-hacking-…
<a href="/three_cube/">OccupytheWeb</a> <a href="/DI0256/">Di</a> <a href="/IamSmouk/">Smouk</a> <a href="/co11ateral/">Co11ateral</a>
Co11ateral (@co11ateral) 's Twitter Profile Photo

Our montly subscription with a discount is soon ending. You can still join our training with 30% off and get access to more than 40 courses Learn more: hackersarise.thinkific.com/bundles/member… OccupytheWeb

Our montly subscription with a discount is soon ending. You can still join our training with 30% off and get access to more than 40 courses

Learn more: hackersarise.thinkific.com/bundles/member…

<a href="/three_cube/">OccupytheWeb</a>
Co11ateral (@co11ateral) 's Twitter Profile Photo

CVE-2025-29969 EventLogin A flaw in the MS-EVEN protocol. Low-privileged users can write arbitrary files to a remote machine, effectively bypassing the need for an administrator account for remote file writes github.com/SafeBreach-Lab… #dfir #blueteam #redteam #pentesting #cve

Co11ateral (@co11ateral) 's Twitter Profile Photo

For those of you who want to learn Powershell but weren’t sure how to approach it, we’ve created a series with more articles on the way. Helpful for both #redteam and #blueteam You can start with Part 1 covering the basics: hackers-arise.com/powershell-for… OccupytheWeb Olexander

For those of you who want to learn Powershell but weren’t sure how to approach it, we’ve created a series with more articles on the way. Helpful for both #redteam and #blueteam

You can start with Part 1 covering the basics: hackers-arise.com/powershell-for…

<a href="/three_cube/">OccupytheWeb</a> <a href="/_aircorridor/">Olexander</a>
Co11ateral (@co11ateral) 's Twitter Profile Photo

Yet another article on PowerShell. This time focusing on Living-off-the-Land techniques to fly under the radar. Useful both for evasion and for detection rule tuning hackers-arise.com/powershell-for… OccupytheWeb Olexander Di #dfir #blueteam #redteam #pentesting #ThreatHunting

Yet another article on PowerShell. This time focusing on Living-off-the-Land techniques to fly under the radar. Useful both for evasion and for detection rule tuning

hackers-arise.com/powershell-for…

<a href="/three_cube/">OccupytheWeb</a> <a href="/_aircorridor/">Olexander</a> <a href="/DI0256/">Di</a> 
#dfir #blueteam #redteam #pentesting #ThreatHunting
Co11ateral (@co11ateral) 's Twitter Profile Photo

Once again OccupytheWeb was right. One of the entities behind it was the Russian Internet Research Agency (IRA). At its peak the Internet Research Agency employed several hundred people divided into specialized departments. The “translator project” oversaw the production of