JB (@joshb96009544) 's Twitter Profile
JB

@joshb96009544

ID: 1467563247524012035

calendar_today05-12-2021 18:35:32

73 Tweet

18 Followers

406 Following

💻 gpiper (@greypiperr) 's Twitter Profile Photo

I’m building incredibly in-depth course work for Command and Control operations as well as detection engineering. This is NOT entry level. Live instruction + lifetime access to materials. Until it launches, once a week I will give away access to someone who retweets and follows

Jord (@0xlegacyy) 's Twitter Profile Photo

Decided I'd like to make a career swap toward the defensive side: e.g. Detection Engineering, Threat Research etc. Happy to provide more information via DM 🙏 (also any retweets would be greatly appreciated)

MalDev Academy (@maldevacademy) 's Twitter Profile Photo

We're excited to announce the upcoming launch of our new course: Offensive Phishing Operations. More Info: maldevacademy.com/phishing-course Syllabus: maldevacademy.com/phishing-cours… Launch date: March 2025

CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

A little while ago I tweeted about a potential BOF-PE design. So here it is, a new design that includes a fully linked PE, C++ exceptions and use of the STL template library.

CCob🏴󠁧󠁢󠁷󠁬󠁳󠁿 (@_ethicalchaos_) 's Twitter Profile Photo

I spoke about the initial credential guard vulnerability at #SOCON2025, but I left out the part where the fix could be bypassed. Both bypasses have now been fixed which I cover in my blog post along with some juicy technical details. Enjoy.

Rio (@0x09al) 's Twitter Profile Photo

We have already received some incredible submissions for the 4th edition of BSides Tirana . From hacking Machine Learning models to deep dives into Vehicle Security. The lineup is shaping up to be our best yet! Think you’ve got a talk that belongs on that stage? We’d love to

We have already received some incredible submissions for the 4th edition of <a href="/BSidesTirana/">BSides Tirana</a> . From hacking Machine Learning models to deep dives into Vehicle Security. The lineup is shaping up to be our best yet!

Think  you’ve got a talk that belongs on that stage?
We’d love to
I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

well i have something unfortunate to share last night they gave my bounty an important rating, but marked it out of scope some how all of this is just wildly dishonest. For one its not just information disclosure. I included and addendum that showed how to leak bearer tokens and

well i have something unfortunate to share
last night they gave my bounty an important rating, but marked it out of scope some how

all of this is just wildly dishonest. For one its not just information disclosure. I included and addendum that showed how to leak bearer tokens and
NetSPI (@netspi) 's Twitter Profile Photo

NetSPI's Sam. Beaumont and Larry Trowell developed RayV Lite—a low-cost laser fault injection tool that makes advanced hardware security testing accessible beyond nation-states using open-source hardware & inexpensive IR-leaking lasers. ➡️ ow.ly/Nqtm50W4fjT

NetSPI's <a href="/PANTH13R/">Sam. Beaumont</a> and Larry Trowell developed RayV Lite—a low-cost laser fault injection tool that makes advanced hardware security testing accessible beyond nation-states using open-source hardware &amp; inexpensive IR-leaking lasers.

➡️  ow.ly/Nqtm50W4fjT
Rio (@0x09al) 's Twitter Profile Photo

Oh you thought surprises were over for BSides Tirana 2025 ? This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn" (SinSinology) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000. He’s been kind enough to

Oh you thought surprises were over for <a href="/BSidesTirana/">BSides Tirana</a> 2025 ?

This year, we’re bringing Sina Kheirkhah - Pwn2Own "Master of Pwn"
(<a href="/SinSinology/">SinSinology</a>) to run a full-day workshop on Advanced .NET Exploitation based on his course that normally goes for €4,000.

He’s been kind enough to
Wietze (@wietze) 's Twitter Profile Photo

UAC bypass can be achieved by eg moving the legit perfmon.exe and an evil atl.dll to "c:\windows \system32". Windows is tricked into thinking it's a safe/trusted directory, meaning perfmon will launch with high integrity and also loads your DLL. Several other EXEs are vulnerable!