SysAdm (@sysadm_) 's Twitter Profile
SysAdm

@sysadm_

Student at @Epitech / CyberSecurity Pentester & CTF Hunter

ID: 1496099068312961024

calendar_today22-02-2022 12:27:17

57 Tweet

28 Followers

257 Following

The Hacker News (@thehackersnews) 's Twitter Profile Photo

🛑 URGENT SECURITY ALERT! Secret backdoor found in XZ Utils compression library used by major #Linux distros, like Fedora, Kali Linux, and openSUSE. Attackers could breach SSH and take control of systems. thehackernews.com/2024/03/urgent… Update and review your systems immediately.

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel 👉 code: github.com/mrwadams/attac… 👉 app: attackgen.streamlit.app

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel

👉 code: github.com/mrwadams/attac…
👉 app: attackgen.streamlit.app
Clint Gibler (@clintgibler) 's Twitter Profile Photo

😈 Red Teaming TTPs Useful techniques, tactics, and procedures for red teamers and defenders Cheatsheets and guides Covering: cloud, ICS, Linux, Mac OS, threat intel, web, Windows, and more. github.com/RoseSecurity/R…

😈 Red Teaming TTPs

Useful techniques, tactics, and procedures for red teamers and defenders

Cheatsheets and guides

Covering: cloud, ICS, Linux, Mac OS, threat intel, web, Windows, and more.

github.com/RoseSecurity/R…
Jonny Johnson (@jsecurity101) 's Twitter Profile Photo

We have all heard about attackers leveraging firewall policies or WFP to block EDRs from communicating with their servers. Today I am releasing a Huntress blog talking about how to mitigate that tampering technique within EDR products: huntress.com/blog/silencing…

SinSinology (@sinsinology) 's Twitter Profile Photo

🔥💀After 40 hours of constant reversing of weird looking c++ and no sleep, I Finally cooked the CVE-2024-47575 fortimanager unauthenticated RCE 🩸

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETresearch discovered an #exploit targeting Firefox and Windows zero days, used in the wild by Russia-aligned #RomCom. Browsing a specially crafted web page runs arbitrary code with the privileges of the user, compromising the PC. 🏴‍☠️ & R.Dumont welivesecurity.com/en/eset-resear… 1/7

#ESETresearch discovered an #exploit targeting Firefox and Windows zero days, used in the wild by Russia-aligned #RomCom. Browsing a specially crafted web page runs arbitrary code with the privileges of the user, compromising the PC. <a href="/dmnsch/">🏴‍☠️</a> &amp; R.Dumont welivesecurity.com/en/eset-resear… 1/7
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓I’ve been using Maltego Graph for a while, and it’s one of the best tools for visualizing investigations and pivoting! One of the best feature is the use of Machines to automate pivoting and enrichment! 🤖 🔍 For example, you can create a Machine to automatically enrich an IP

🤓I’ve been using Maltego Graph for a while, and it’s one of the best tools for visualizing investigations and pivoting!

One of the best feature is the use of Machines to automate pivoting and enrichment! 🤖

🔍 For example, you can create a Machine to automatically enrich an IP
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

C2 infrastructure that allows Red Teamers to execute system commands on compromised hosts through Microsoft Teams. github.com/cxnturi0n/conv…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Network recon framework. Build your own, self-hosted and fully-controlled alternatives to Shodan / ZoomEye / Censys and GreyNoise, run your Passive DNS service, build your taylor-made EASM tool github.com/ivre/ivre

volatility (@volatility) 's Twitter Profile Photo

We are very excited to announce that Volatility 3 has reached parity with Volatility 2! With this achievement, Volatility 2 is now deprecated. See the full details in our blog post: volatilityfoundation.org/announcing-the…

ESET Research (@esetresearch) 's Twitter Profile Photo

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6

#ESETResearch has discovered the first known AI-powered ransomware, which we named #PromptLock. The PromptLock malware uses the gpt-oss:20b model from OpenAI locally via the Ollama API to generate malicious Lua scripts on the fly, which it then executes 1/6
International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP. The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the

‼️🚨 BREAKING: An AI found a Linux kernel zero-day that roots every distribution since 2017. The exploit fits in 732 bytes of Python. Patch your kernel ASAP.

The vulnerability is CVE-2026-31431, nicknamed "Copy Fail," disclosed today by Theori. It has been sitting quietly in the