0x0sec (@0x0sec) 's Twitter Profile
0x0sec

@0x0sec

OSCP Student, DFIR, Reverse Engineering, Exploit Dev, Entrepreneur, NEO Sports Fan... Tweets are Tweets... RT != Endorsement.

ID: 2243095056

linkhttps://infosec.exchange/@TheeCodePoet calendar_today13-12-2013 00:09:04

1,1K Tweet

1,1K Followers

4,4K Following

singlemode (@singiemode) 's Twitter Profile Photo

Elon Musk David Shapiro (L/0) anyone can get access to grok-3 w=new WeakSet();(function r(o){if(!o||typeof o!="object"||w.has(o))return;w.add(o);for(k in o)try{o[k]==="grok-2a"?o[k]="grok-3":r(o[k])}catch(e){}})(window); run this in console before creating a new chat

<a href="/elonmusk/">Elon Musk</a> <a href="/wesroth/"></a> <a href="/daveshapi/">David Shapiro (L/0)</a> anyone can get access to grok-3

w=new WeakSet();(function r(o){if(!o||typeof o!="object"||w.has(o))return;w.add(o);for(k in o)try{o[k]==="grok-2a"?o[k]="grok-3":r(o[k])}catch(e){}})(window);

run this in console before creating a new chat
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 I've built the ultimate threat actor attribution tool!! Okay, okay… not quite ultimate, but still pretty useful. 😅 Let me explain. 👇 When you investigate an attack, sometimes you know what you are looking at—maybe you are an experienced analyst or have tracked a threat

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨 Critical Security Vulnerability 🆔 CVE-2025-26605, CVE-2025-26606, CVE-2025-26607, CVE-2025-26608, CVE-2025-26609, CVE-2025-26610, CVE-2025-26611, CVE-2025-26612, CVE-2025-26613, CVE-2025-26614, CVE-2025-26615, CVE-2025-26616, CVE-2025-26617 💣 CVSS Score: 9.4, 10, 10, 10, 10,

🚨 Critical Security Vulnerability
🆔 CVE-2025-26605, CVE-2025-26606, CVE-2025-26607, CVE-2025-26608, CVE-2025-26609, CVE-2025-26610, CVE-2025-26611, CVE-2025-26612, CVE-2025-26613, CVE-2025-26614, CVE-2025-26615, CVE-2025-26616, CVE-2025-26617
💣 CVSS Score: 9.4, 10, 10, 10, 10,
vx-underground (@vxunderground) 's Twitter Profile Photo

Today Lockbit ransomware group issued a message to Kash Patel, the new Director of the United States Federal Bureau of Investigation. He requested Kash Patel contact him via Tox and offered him a file titled "personal_gift_for_new_director_FBI_Kash_Patel.7z". The file is

Jake Williams (@malwarejake) 's Twitter Profile Photo

If you think Russian cyber actors are a threat, the time to start increasing your native CTI capability is NOW. As of last week, it's clear the government has its fingers on the attribution scale. Even commercial attribution is suspect given retribution against contractors.

Tavis Ormandy (@taviso) 's Twitter Profile Photo

You can now jailbreak your AMD CPU! 🔥We've just released a full microcode toolchain, with source code and tutorials. bughunters.google.com/blog/542484235…

Emmanuel Goldstein (Bluesky: @goldste.in) 🇺🇦 (@emmangoldstein) 's Twitter Profile Photo

JUST IN - @[email protected] - @2600.com on Bluesky 🇸🇴 Twitter (X) account has been locked. They claim we published "people's private information without their express authorization and permission." We published names and email addresses of people working for the government. We will not be intimidated.

JUST IN - <a href="/2600/">@2600@mastodon.online - @2600.com on Bluesky 🇸🇴</a> Twitter (X) account has been locked.

They claim we published "people's private information without their express authorization and permission."

We published names and email addresses of people working for the government. We will not be intimidated.
hackerfantastic.x (@hackerfantastic) 's Twitter Profile Photo

Exploitation of CVE-2025-21204. Low-privileged user creates an "inetpub" and populates with content. Administrator later installs IIS (logic bomb). The attackers malicious IIS data is still available, executes code under IIS privileges resulting in an LPE. KB/patches do stuff too

Exploitation of CVE-2025-21204. Low-privileged user creates an "inetpub" and populates with content. Administrator later installs IIS (logic bomb). The attackers malicious IIS data is still available, executes code under IIS privileges resulting in an LPE. KB/patches do stuff too
TrustedSec (@trustedsec) 's Twitter Profile Photo

Finding the baud rate can be a major step in key getting a shell on an IoT device; how do you do that without just trying every common rate? In this blog, Sr Security Consultant Brian Berg demonstrates a logic analyzer to help get a foothold on a device. trustedsec.com/blog/discoveri…

vx-underground (@vxunderground) 's Twitter Profile Photo

July 3rd RedDrip7 Cyber Threat Intelligence, in conjunction with Beijing-based Qi An Pangu Lab, released details on a state-sponsored group who is playfully named "NightEagle" a/k/a APT-Q-95 APT-Q-95 is named "NightEagle" is because it "moves as fast as an Eagle", and only

July 3rd RedDrip7 Cyber Threat Intelligence, in conjunction with Beijing-based Qi An Pangu Lab, released details on a state-sponsored group who is playfully named "NightEagle" a/k/a APT-Q-95

APT-Q-95 is named "NightEagle" is because it "moves as fast as an Eagle", and only
vx-underground (@vxunderground) 's Twitter Profile Photo

Hello, how are you? tl;dr I'm back. We're back in the malware biz 🤝 I've been AFKing and schizo meme posting for the past 3 months. Unfortunately, it is time for me to return to reality (newborn is less insane). First order of business: we're rebuilding and enhancing our

BSidesCleveland (@bsidescleveland) 's Twitter Profile Photo

Ticket sales now open! CFPs close soon, and sponsorships are still available - talk to your employers about supporting the event! zeffy.com/en-US/ticketin…

TrustedSec (@trustedsec) 's Twitter Profile Photo

The recent AWS outage wasn’t a hack—but it was a warning. Dave Kennedy spoke with TheStreet about how the event exposed “cracks in core cloud infrastructure” and highlighted the need for stronger redundancy to protect critical services. Read now! thestreet.com/technology/cyb…

TrustedSec (@trustedsec) 's Twitter Profile Photo

Just because software can live on a Domain Controller doesn’t mean it belongs there. In this blog, Scott Blake offers a practical guide to understanding the risks and asking the right questions before expanding your Tier 0 attack surface. Read now! hubs.la/Q03YCrLG0

0x0sec (@0x0sec) 's Twitter Profile Photo

Verifying myself: I am theecodepoet on Keybase.io. qzXysD9Gv8teH2T3R71Oi2Q3iyfUYLeT3ByM / keybase.io/theecodepoet/s…