hackerfantastic.x (@hackerfantastic) 's Twitter Profile
hackerfantastic.x

@hackerfantastic

Co-Founder @myhackerhouse & dcentral.finance. Cybersecurity & blockchain expert. Author of Hands-on Hacking (ISBN 9781119561453). Offensive Lua. #Web3

ID: 19026149

linkhttps://hacker.house/ calendar_today15-01-2009 15:52:44

156,156K Tweet

104,104K Followers

4,4K Following

flux (@0xfluxsec) 's Twitter Profile Photo

Introducing: Hells Hollow - Thought rootkit SSDT hooking was dead? Following my previous work, I have managed to essentially reintroduce SSDT hooks, capable of modifying the *original* KTRAP_FRAME and more! Whitepaper: fluxsec.red/hells-hollow-a… #infosec #cybersecurity

Introducing: Hells Hollow - Thought rootkit SSDT hooking was dead? Following my previous work, I have managed to essentially reintroduce SSDT hooks, capable of modifying the *original* KTRAP_FRAME and more!

Whitepaper: fluxsec.red/hells-hollow-a…

#infosec #cybersecurity
Preston Byrne (@prestonjbyrne) 's Twitter Profile Photo

One thing UK politicians should be mindful of over the next few weeks, as US activist lawyers stop their foreign censorship scheme cold at the American waterline, is that most of us are doing it pro bono. We’re not going to beat you for work. We’re going to beat you for fun

The Free Speech Union (@speechunion) 's Twitter Profile Photo

'If you censor me, you’re making a mistake’: Trump responds to online safety laws amid claims ‘free speech at risk’ lbc.co.uk/usa/politics/c…

安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

This was kinda interesting to run into in the wild - the developer of this malware wanted to to terminate all TCP connections of a process via the TCP table. Instead of using SetTcpEntry, they reimplemented the entire function by copying the underlying implementation from

This was kinda interesting to run into in the wild - the developer of this malware wanted to to terminate all TCP connections of a process via the TCP table.

Instead of using SetTcpEntry, they reimplemented the entire function by copying the underlying implementation from
安坂星海 Azaka || VTuber (@azakasekai_) 's Twitter Profile Photo

This appears to be a relatively "new" (even though really it's just copying the impl) technique that has only been documented by one Chinese researcher in June in recent alleged campaigns by the SilverFox group. github.com/kyxiaxiang/Tcp…

Adam Wren (@g0adm) 's Twitter Profile Photo

Is there a single person that works in tech that’s come out and said the online safety act is good, or even works? All the commentary I’ve seen is just how much is going to damage the industry, not seen a single knowledgeable person in support of it

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

🕷️🚨Scattered Spider—a known cybercriminal group—is using social engineering techniques to target #CriticalInfrastructure organizations & commercial facilities. Review our updated joint cybersecurity advisory for updated IOCs, TTPs, & mitigations: go.dhs.gov/ioX

🕷️🚨Scattered Spider—a known cybercriminal group—is using social engineering techniques to target #CriticalInfrastructure organizations & commercial facilities. Review our updated joint cybersecurity advisory for updated IOCs, TTPs, & mitigations: go.dhs.gov/ioX
Geoff Thew (@g0ffthew) 's Twitter Profile Photo

They come for porn first because it’s one of the easiest things to vilify and the most embarrassing to defend. Because so many of us will automatically laugh at anyone saying “my inability to purchase/access tentacle hentai is a serious threat to free speech” even when it 100% is

GB News (@gbnews) 's Twitter Profile Photo

'You're going to see a continued fight to make sure that this doesn't creep into America.' Antitrust Subcommittee Chairman Scott Fitzgerald on the UK's Online Safety Bill. 📺 Freeview 236, Sky 512, Virgin 604 🔓 Become a GB News Member: gbnews.com/support

Reclaim The Net (@reclaimthenethq) 's Twitter Profile Photo

🚨 Mississippi greenlit a law that forces everyone to use digital ID to access social media. No ID, no voice. This is House Bill 1126: a wide-reaching age-verification law with few limits. The state would compel all users to prove identity and age before creating accounts. The

Cybersecurity and Infrastructure Security Agency (@cisagov) 's Twitter Profile Photo

Implementing microsegmentation in zero trust is a significant shift for all organizations. We published new guidance to help federal agencies and other organizations appropriately plan this transition: go.dhs.gov/ioV

Implementing microsegmentation in zero trust is a significant shift for all organizations. We published new guidance to help federal agencies and other organizations appropriately plan this transition: go.dhs.gov/ioV
nixCraft 🐧 (@nixcraft) 's Twitter Profile Photo

The `asn` is command line ASN lookup tool. It can do RPKI validity, BGP stats, ASPath, IP reputation, IP geolocation, IP fingerprinting, Network recon / lookup tool. It is a prefect tool to look into IP address for security reasons and recommend for IT or network professionals.

The `asn` is command line ASN lookup tool. It can do RPKI validity, BGP stats, ASPath, IP reputation, IP geolocation, IP fingerprinting, Network recon / lookup tool. It is a prefect tool to look into IP address for security reasons and recommend for IT or network professionals.