Genuine (@hopper6576) 's Twitter Profile
Genuine

@hopper6576

😁

ID: 1144951921720975362

calendar_today29-06-2019 12:53:05

45 Tweet

72 Takipçi

263 Takip Edilen

HyperDbg (@hyperdbg) 's Twitter Profile Photo

Here we made an article about the kernel debugger of HyperDbg ("kHyperDbg"). This article describes the overall architecture, technical difficulties, design decisions, and internals of this debugger. research.hyperdbg.org/debugger/kerne…

THREAT CON (@threat_con) 's Twitter Profile Photo

📢📢 Giveaway alert‼️ 🎉 Retweet Like and Follow get a chance to 🎊 win the 🎁 OffSec PEN-200 course + 90 days of lab access + one OSCP exam attempt. The #Giveaway will only be up until the 📅15th of AUGUST so hurry up‼️ #cybersecurity #infosec #THREATCON2022

📢📢 Giveaway alert‼️

🎉 Retweet Like and Follow get a chance to 🎊 win the 🎁 <a href="/offsectraining/">OffSec</a> PEN-200 course + 90 days of lab access  + one OSCP exam attempt. 

The #Giveaway will only be up until the 📅15th of AUGUST so hurry up‼️

#cybersecurity #infosec #THREATCON2022
ptr-yudai (@ptryudai) 's Twitter Profile Photo

I've released a beta version of #pawnyable, a website to learn advanced binary exploitation🐺🐱🐰🐼 Currently only the Linux Kernel chapter is about 90% complete😖 Other chapters and multilingual support are TODO😇 pawnyable.cafe

THREAT CON (@threat_con) 's Twitter Profile Photo

📢📢Giveaway alert! Today, on the occasion of Janai Purnima/Rakshya Bandhan, we are giving "1-year ✅VIP subscription worth $135" from🙌 #HTB 👉👉Follow THREAT CON and like and retweet to participate❗ 🎁🎉 #Giveway result will be announced in 24 hours..❗

Jackson (@sjkelleyjr) 's Twitter Profile Photo

I saw a tweet once that went something like: * the devs check for re-entrancy * the auditors check for oracle manipulation * the attacker calls emergencyWithdraw() I think about that tweet often

ATTL4S (@danilj94) 's Twitter Profile Photo

Understanding Windows Lateral Movements videos are now available Three videos with more than two hours of content about Windows authentication, user impersonation and lateral movements Find them at attl4s.github.io

Understanding Windows Lateral Movements videos are  now available

Three videos with more than two hours of content about Windows authentication, user impersonation and lateral movements

Find them at attl4s.github.io
Daniel (@ergot86) 's Twitter Profile Photo

Security researchers, even experts, should work in software dev for a while. It’s humbling. Creating software is more challenging than verifying it. It is easy to find vulnerabilities in software that you might not have the skills to develop by yourself.

nixCraft 🐧 (@nixcraft) 's Twitter Profile Photo

OMG. This is the real deal. Bython: Python with braces. Because Python is awesome, but whitespace is awful. Bython is a Python preprosessor which translates curly brackets into indentation. Would you use this? pypi.org/project/Bython/

OMG. This is the real deal. Bython: Python with braces. Because Python is awesome, but whitespace is awful. Bython is a Python preprosessor which translates curly brackets into indentation. Would you use this? pypi.org/project/Bython/
laurence (@functi0nzer0) 's Twitter Profile Photo

A dude has a meticulous 2 year plan to include a backdoor into almost every system in the world Only to fail because a guy started to notice that his ssh login is 0.5 seconds slow for some reason Study autistic byte-wizards

TheLiverDoc (@theliverdr) 's Twitter Profile Photo

Come every weekend, we get to see pictures of escapades and holidays featuring cocktails and glasses from many on social media including here, on Twitter. You may not realize it, but everytime we normalize drinking alcohol on social media posts as if it is some sort of ultimate

Include Security (@includesecurity) 's Twitter Profile Photo

Who hacks the hackers? We do! Our new research on vulns in multiple common C2 frameworks used by netpen and red teams. If you use any of these take a look and patch up. blog.includesecurity.com

Dr Milan Milanović (@milan_milanovic) 's Twitter Profile Photo

𝗟𝗲𝗮𝗿𝗻 𝗳𝘂𝗻𝗱𝗮𝗺𝗲𝗻𝘁𝗮𝗹𝘀 𝗻𝗼𝘁 𝗳𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸𝘀 We developers like to learn new stuff and try it ASAP. That stuff consists mainly of new frameworks and tools (such as React, Angular, Spring, Web Forms, etc.). Yet, those frameworks usually have 𝗮 𝘀𝗵𝗼𝗿𝘁

𝗟𝗲𝗮𝗿𝗻 𝗳𝘂𝗻𝗱𝗮𝗺𝗲𝗻𝘁𝗮𝗹𝘀 𝗻𝗼𝘁 𝗳𝗿𝗮𝗺𝗲𝘄𝗼𝗿𝗸𝘀

We developers like to learn new stuff and try it ASAP. That stuff consists mainly of new frameworks and tools (such as React, Angular, Spring, Web Forms, etc.). Yet, those frameworks usually have 𝗮 𝘀𝗵𝗼𝗿𝘁
Abhishek🌱 (@abhishekcur) 's Twitter Profile Photo

The Most In-Depth Operating System concepts Breakdown on YouTube – With Animations. -Very detailed OS concepts like program and process difference -why stack is fast but heap is slow -concurrency and CPU's -Computer hardware -Very beginner friendly -detailed overview -much more

The Most In-Depth Operating System concepts Breakdown on YouTube – With Animations.
-Very detailed OS concepts like program and process difference
-why stack is fast but heap is slow
-concurrency and CPU's
-Computer hardware 
-Very beginner friendly
-detailed overview
-much more