Bandit Pingu (@flyingphishy) 's Twitter Profile
Bandit Pingu

@flyingphishy

// Professional Bandit // Hacker, Researcher, Tinkerer // Personal Views

ID: 1134835939249917953

linkhttps://github.com/FlyingPhish calendar_today01-06-2019 14:55:46

1,1K Tweet

275 Followers

1,1K Following

SMSPool.net (@smspoolnet) 's Twitter Profile Photo

The UK Home Office confirms they’ve been hacked. And the UK government thinks Digital ID is a good idea? They can’t even protect their own systems, as seen time and time again. Maybe focus on basic cybersecurity before asking for the keys to your citizens entire lives.

Qiusheng Wu (@giswqs) 's Twitter Profile Photo

🎁 A New Year’s gift to the geospatial community: a brand-new QGIS plugin that unlocks access to 80+ petabytes of satellite imagery and geospatial datasets with zero coding required. In my first video of 2026, I’m excited to share what might be one of the most powerful QGIS

spencer (@techspence) 's Twitter Profile Photo

Unsafe Active Directory permissions I commonly find during internal pentests and how to find them yourself. 🧵 A quick rundown, starting with my favorite...

Unsafe Active Directory permissions I commonly find during internal pentests and how to find them yourself.

🧵 A quick rundown, starting with my favorite...
dreadnode (@dreadnode) 's Twitter Profile Photo

We fine-tuned an 8B model to pop a GOAD domain…using only synthetic training data. No real networks. No frontier model distillation. Just a world model that simulates AD environments and generates realistic pentesting trajectories. See how shane and Max Harley did it:

We fine-tuned an 8B model to pop a GOAD domain…using only synthetic training data. No real networks. No frontier model distillation. Just a world model that simulates AD environments and generates realistic pentesting trajectories. 

See how <a href="/shncldwll/">shane</a> and <a href="/0xdab0/">Max Harley</a> did it:
Justin Elze (@hackinglz) 's Twitter Profile Photo

Kali just published a guide on piping pentesting tools through Claude's API and didn't mention data security once. You're sending scan results, target info, and potentially sensitive findings to a third party LLM. "The Most Advanced Penetration Testing Distribution" should

Jake Williams (@malwarejake) 's Twitter Profile Photo

Not a week passes that I don't find more evidence that Copilot was a rush job from Microsoft and has serious limitations for enterprises. learn.microsoft.com/en-us/purview/…

Not a week passes that I don't find more evidence that Copilot was a rush job from Microsoft and has serious limitations for enterprises.
learn.microsoft.com/en-us/purview/…
Jason Lang (@curi0usjack) 's Twitter Profile Photo

I used to get upset at testing EDRs, thinking that we were just burning high-end tradecraft forever, but ironically corporate greed has ensured that a lot of orgs can't afford to get those bespoke detections even though they could just be purple teamed for free using Graylog.

Dan Neidle (@danneidle) 's Twitter Profile Photo

I see some weird things but this takes the biscuit. A vulnerability in the Companies House website, that let anyone view the private dashboard of any one of the five million registered companies, see directors' personal details. And modify them.

Dan Neidle (@danneidle) 's Twitter Profile Photo

Companies House has put out a statement confirming that, for five months, every company in the UK was vulnerable to the simple exploit we identified on Friday. It enabled anyone in the world to view and change their company details.

Companies House has put out a statement confirming that, for five months, every company in the UK was vulnerable to the simple exploit we identified on Friday.  It enabled anyone in the world to view and change their company details.