Oryan De Paz (@oryandp) 's Twitter Profile
Oryan De Paz

@oryandp

Interested in infosec, especially in Windows Internals ๐Ÿ’™ Reverse Engineering ๐Ÿ’š and CTFs โค (oh and did I mention Windows Internals already? ๐Ÿ˜‰)

ID: 935071904158896128

calendar_today27-11-2017 09:04:49

1,1K Tweet

2,2K Followers

455 Following

TuringPost (@theturingpost) 's Twitter Profile Photo

Understanding whatโ€™s really going on inside LLMs is still pretty tricky. Self-interpretation methods are used to let the model explain itself. โ–ช๏ธ Superscopes by Jonathan Jacobi and Gal Niv is a new technique that builds on the older ones but adds a special trick โ€” amplification.

Understanding whatโ€™s really going on inside LLMs is still pretty tricky.

Self-interpretation methods are used to let the model explain itself.

โ–ช๏ธ Superscopes by <a href="/j0nathanj/">Jonathan Jacobi</a> and <a href="/GalNivs/">Gal Niv</a> is a new technique that builds on the older ones but adds a special trick โ€” amplification.
Oryan De Paz (@oryandp) 's Twitter Profile Photo

For the closing keynote - ๐Ÿฅ๐Ÿณ๏ธโ€๐ŸŒˆ Benjamin Delpy, inspiring as always, was encouraging us to implement our own tools, whether it is for learning a new language/skill, or just having some windows fun! ๐Ÿ˜

For the closing keynote - <a href="/gentilkiwi/">๐Ÿฅ๐Ÿณ๏ธโ€๐ŸŒˆ Benjamin Delpy</a>, inspiring as always, was encouraging us to implement our own tools, whether it is for learning a new language/skill, or just having some windows fun! ๐Ÿ˜
Oryan De Paz (@oryandp) 's Twitter Profile Photo

The first day of BlueHat IL is over ๐Ÿ˜ข It exceeded all my expectations! (and you know I had many ๐Ÿซข) Come and say hi if youโ€™re attending tomorrow โ˜บ๏ธ

The first day of <a href="/BlueHatIL/">BlueHat IL</a> is over ๐Ÿ˜ข
It exceeded all my expectations! (and you know I had many ๐Ÿซข)
Come and say hi if youโ€™re attending tomorrow โ˜บ๏ธ
LiveOverflow ๐Ÿ”ด (@liveoverflow) 's Twitter Profile Photo

I met Jonathan Jacobi in 2018 when he was 18y/o presenting at CCC. 6 years later I met him again for an interview to learn more about his life and career. The Life of a Hacker: Jonathan Jacobi

I met <a href="/j0nathanj/">Jonathan Jacobi</a> in 2018 when he was 18y/o presenting at CCC. 6 years later I met him again for an interview to learn more about his life and career.

The Life of a Hacker: Jonathan Jacobi
Jonathan Jacobi (@j0nathanj) 's Twitter Profile Photo

LiveOverflow ๐Ÿ”ด had a huge influence on the very beginning of my career as a researcher, and it was an honor to talk to him about my journey. Oh, and thank you for the tour in Berlin, the food and beer were amazing ๐Ÿป ๐Ÿ˜‚

BlueHat IL (@bluehatil) 's Twitter Profile Photo

Is this some strange Breakfast Club reboot or just our BlueHatIL design for the year? Mystery of the century. Just kidding โ€” itโ€™s totally option B.

Is this some strange Breakfast Club reboot or just our BlueHatIL design for the year? Mystery of the century.
Just kidding โ€” itโ€™s totally option B.
Reclaim Security (@reclaimsecurity) 's Twitter Profile Photo

Prioritization isnโ€™t security! Reclaim CEO Barak Klinghofer breaks down why itโ€™s time to stop managing threats and start eliminating them. ๐Ÿ‘‡ Read the full post: ๐Ÿ”— linkedin.com/pulse/how-secuโ€ฆ #CyberSecurity #ExposureRemediation #ReclaimSecurity

Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

Figured this would be a fun weekend project... Claude Desktop + COM Automation ๐Ÿคฏ Outlook, Excel, Word, Shell - anything with a COM interface on Windows is now discoverable and scriptable using this MCP server that wraps COM. AI just got an upgrade. ๐Ÿš€

Figured this would be a fun weekend project... 

Claude Desktop + COM Automation ๐Ÿคฏ

Outlook, Excel, Word, Shell - anything with a COM interface on Windows is now discoverable and scriptable using this MCP server that wraps COM. 

AI just got an upgrade. ๐Ÿš€
Denis Laskov ๐Ÿ‡ฎ๐Ÿ‡ฑ (@it4sec) 's Twitter Profile Photo

SIM cards โ€“ programmable, low-power computers embedded in your phone. Here are their capabilities and security vulnerabilities. ๐ŸŽซ๐Ÿ“ฑ๐ŸŽฎ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป Link to post: linkedin.com/posts/dlaskov_โ€ฆ

SIM cards โ€“ programmable, low-power computers embedded in your phone. Here are their capabilities and security vulnerabilities. ๐ŸŽซ๐Ÿ“ฑ๐ŸŽฎ๐Ÿ‘จ๐Ÿปโ€๐Ÿ’ป

Link to post: linkedin.com/posts/dlaskov_โ€ฆ
Virnik (@v1rn1k) 's Twitter Profile Photo

Building Reclaim Security has been an incredible journey - turning research ideas into real-world impact. Iโ€™m super proud of what weโ€™re creating. If balancing security and productivity sounds like a dream - reach out!

Oryan De Paz (@oryandp) 's Twitter Profile Photo

If anyone understands how much security restrictions can hinder daily work, itโ€™s us- the researchers. Weโ€™ve all had to find workarounds just to get the job done. Good thing 2025 finally brought a security solution that faces the problem head-on,and actually takes us into account.

BlueHat IL (@bluehatil) 's Twitter Profile Photo

Cyber wizards, start your engines and assemble your squads: The Kusto Detective Agency is back with Call of the Cyber Duty โ€“ a brand new competition thatโ€™ll push your skills to the limit. And yes, this showdown comes with insane prizes. Register now: detective.kusto.io/register

Cyber wizards, start your engines and assemble your squads: The Kusto Detective Agency is back with Call of the Cyber Duty โ€“ a brand new competition thatโ€™ll push your skills to the limit. And yes, this showdown comes with insane prizes. Register now: detective.kusto.io/register
Jonathan Jacobi (@j0nathanj) 's Twitter Profile Photo

Introducing Multiverse: the first AI-generated multiplayer game. Multiplayer was the missing piece in AI-generated worlds โ€” now itโ€™s here. Players can interact and shape a shared AI-simulated world, in real-time. Training and research cost < $1.5K. Run it on your own PC. We

Amir Barkol (@barkolamir) 's Twitter Profile Photo

ืจื‘ื™ื ืฉื•ืืœื™ื ืื•ืชื™ ืืžื™ืจ ืžื” ืืชื” ืžืžืœื™ืฅ ืœืขืฉื•ืช ื‘-17 ื‘ื™ื•ื ื™ ื‘ืขืจื‘ ื•ืœื”ื ืื ื™ ืขื•ื ื” ืฉืืœื” ื˜ื•ื‘ื” ืฉืจื’ื, ืžื™ืงืจื•ืกื•ืคื˜ ืขื•ืจื›ืช ืื™ืจื•ืข ืžืจื”ื™ื‘ ืขื ืชื•ืขืคื•ืช ืฉืœ ื‘ื™ื ื•ืช ืžืœืื›ื•ืชื™ื•ืช, ืกื•ื•ื“ืจื™ื ืžื›ื•ืขืจื™ื, ืžืชื—ืžื™ื ืื™ื ื˜ืจืงื˜ื™ื‘ื™ื™ื, ืกื“ื ืื•ืช, ื”ืจืฆืื•ืช, ื•ื”ืคืชืขื” ืขืฆื•ืžื” ืื—ืช ืฉืืกื•ืจ ืœื™ ืžืฉืคื˜ื™ืช ืœื—ืฉื•ืฃ. ื ืจืฉืžื™ื ืคื”: aka.ms/AIPlayground20โ€ฆ

ืจื‘ื™ื ืฉื•ืืœื™ื ืื•ืชื™ ืืžื™ืจ ืžื” ืืชื” ืžืžืœื™ืฅ ืœืขืฉื•ืช ื‘-17 ื‘ื™ื•ื ื™ ื‘ืขืจื‘ ื•ืœื”ื ืื ื™ ืขื•ื ื” ืฉืืœื” ื˜ื•ื‘ื” ืฉืจื’ื, ืžื™ืงืจื•ืกื•ืคื˜ ืขื•ืจื›ืช ืื™ืจื•ืข ืžืจื”ื™ื‘ ืขื ืชื•ืขืคื•ืช ืฉืœ ื‘ื™ื ื•ืช ืžืœืื›ื•ืชื™ื•ืช, ืกื•ื•ื“ืจื™ื ืžื›ื•ืขืจื™ื, ืžืชื—ืžื™ื ืื™ื ื˜ืจืงื˜ื™ื‘ื™ื™ื, ืกื“ื ืื•ืช, ื”ืจืฆืื•ืช, ื•ื”ืคืชืขื” ืขืฆื•ืžื” ืื—ืช ืฉืืกื•ืจ ืœื™ ืžืฉืคื˜ื™ืช ืœื—ืฉื•ืฃ. ื ืจืฉืžื™ื ืคื”: aka.ms/AIPlayground20โ€ฆ
RE//verse (@reverseconf) 's Twitter Profile Photo

Working with the JVM or just curious how to dig deeper into it? Marcโ€™s Dynamic Analysis of JVM Processes from RE//verse 2025 is a good one to queue up. Give it a look: youtu.be/yzcNJn_EOwg?feโ€ฆ

Working with the JVM or just curious how to dig deeper into it? Marcโ€™s Dynamic Analysis of JVM Processes from RE//verse 2025 is a good one to queue up. Give it a look: youtu.be/yzcNJn_EOwg?feโ€ฆ