Hannah Schneider (@hschneidertech) 's Twitter Profile
Hannah Schneider

@hschneidertech

Verbindung der digitalen Punkte ๐ŸŒ

ID: 1723309658583035905

calendar_today11-11-2023 12:00:15

160 Tweet

7 Takipรงi

144 Takip Edilen

Smukx.E (@5mukx) 's Twitter Profile Photo

Dirty Vanity: A New Approach to Code Injection & EDR Bypass Blog: deepinstinct.com/blog/dirty-vanโ€ฆ Rust PoC: github.com/Whitecat18/Rusโ€ฆ

Dirty Vanity: A New Approach to Code Injection & EDR Bypass

Blog: deepinstinct.com/blog/dirty-vanโ€ฆ

Rust PoC: github.com/Whitecat18/Rusโ€ฆ
SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

Hunting EDR Freeze... A recent EDR-Freeze technique by Two Seven One Three can suspend a given EDR process. Now it's time to hunt it down with few logs and clever correlation. The post: blog.axelarator.net/hunting-for-edโ€ฆ #redteam #blueteam #maldev Hunting EDR Freeze... A recent EDR-Freeze

Hunting EDR Freeze...

A recent EDR-Freeze technique by <a href="/TwoSevenOneT/">Two Seven One Three</a> can suspend a given EDR process.
Now it's time to hunt it down with few logs and clever correlation.

The post: blog.axelarator.net/hunting-for-edโ€ฆ

#redteam #blueteam #maldev Hunting EDR Freeze...

A recent EDR-Freeze
Ben (@polygonben) 's Twitter Profile Photo

My first Huntress blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers. Big thanks to RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ for the help! ๐Ÿ˜‡ huntress.com/blog/clickfix-โ€ฆ

My first <a href="/HuntressLabs/">Huntress</a> blog is live: we break down some funky ClickFix lures that lead to a loader which uses steganography to extract shellcode and ultimately deliver LummaC2/Rhadamanyths stealers.

Big thanks to <a href="/RussianPanda9xx/">RussianPanda ๐Ÿผ ๐Ÿ‡บ๐Ÿ‡ฆ</a> for the help! ๐Ÿ˜‡

huntress.com/blog/clickfix-โ€ฆ
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Kaspersky exposed ToddyCat APT's evolution: the group steals M365 OAuth tokens from memory and uses TCSectorCopy to steal locked Outlook OST files, allowing covert access to cloud email outside the perimeter #ToddyCat #M365Hack #Cyberespionage #OAuthToken securityonline.info/toddycat-apt-sโ€ฆ

Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - Red-Hex-Consulting/Ankou: A flexible, AI powered C2 framework built with operators in mind github.com/Red-Hex-Consulโ€ฆ

Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

Golden dMSA - This tool exploits a new attack against delegated Managed Service Accounts called the "Golden DMSA" attack. The technique allows attackers to generate passwords for all associated dMSAs offline. meterpreter.org/golden-dmsa-toโ€ฆ

Golden dMSA - This tool exploits a new attack against delegated Managed Service Accounts called the "Golden DMSA" attack. The technique allows attackers to generate passwords for all associated dMSAs offline.
meterpreter.org/golden-dmsa-toโ€ฆ
TrustedSec (@trustedsec) 's Twitter Profile Photo

ICYMI: In this blog, Oddvar Moe goes over a clever DLL hijack that turns Windows Narrator into a persistence vector. Got questions? Our next Discord Livestream is on December 4 where heโ€™ll be answering your questions on Windows Accessibility. Read now! trustedsec.com/blog/hack-cessโ€ฆ

Hunt.io (@huntio) 's Twitter Profile Photo

๐Ÿšฉ CTM360 Exposes Global WhatsApp Infrastructure for Supply-Chain Attacks thehackernews.com/2025/11/ctm360โ€ฆ A server-side flaw in the CTM360 bulk-SMS platform allowed attackers to hijack push-delivery endpoints for over 2 billion #WhatsApp messages globally, enabling them to inject

Hunter (@huntermapping) 's Twitter Profile Photo

๐ŸšจAlert๐Ÿšจ:CVE-2025-58360:XML External Entity Vulnerability in GeoServer WMS GetMap Operation ๐Ÿ“Š51.7K Services are found on the hunter.how yearly. ๐Ÿ”—Hunter Link:hunter.how/list?searchValโ€ฆ ๐Ÿ‘‡Query HUNTER : product.name="GeoServer"

๐ŸšจAlert๐Ÿšจ:CVE-2025-58360:XML External Entity Vulnerability in GeoServer WMS
GetMap Operation
๐Ÿ“Š51.7K Services are found on the hunter.how yearly.
๐Ÿ”—Hunter Link:hunter.how/list?searchValโ€ฆ
๐Ÿ‘‡Query
HUNTER : product.name="GeoServer"
OQ TECHNOLOGY - Connecting 24 Billion Devices (@oqtec) 's Twitter Profile Photo

๐—” ๐—น๐—ฎ๐—ป๐—ฑ๐—บ๐—ฎ๐—ฟ๐—ธ ๐—บ๐—ผ๐—บ๐—ฒ๐—ป๐˜ย โžก๏ธ a satellite signal travelling ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—น๐˜† ๐˜๐—ผ ๐—ฎ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐˜€๐—บ๐—ฎ๐—ฟ๐˜๐—ฝ๐—ต๐—ผ๐—ป๐—ฒ and triggering an emergency alert instantly, securely and to everyday smartphones. No apps and no pairing, just true satellite-to-device capability,

๐—” ๐—น๐—ฎ๐—ป๐—ฑ๐—บ๐—ฎ๐—ฟ๐—ธ ๐—บ๐—ผ๐—บ๐—ฒ๐—ป๐˜ย โžก๏ธ a satellite signal travelling ๐—ฑ๐—ถ๐—ฟ๐—ฒ๐—ฐ๐˜๐—น๐˜† ๐˜๐—ผ ๐—ฎ ๐˜€๐˜๐—ฎ๐—ป๐—ฑ๐—ฎ๐—ฟ๐—ฑ ๐˜€๐—บ๐—ฎ๐—ฟ๐˜๐—ฝ๐—ต๐—ผ๐—ป๐—ฒ and triggering an emergency alert instantly, securely and to everyday smartphones.

No apps and no pairing, just true satellite-to-device capability,
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Unpacking the AAD Broker LocalState Cache - SpecterOps'' #infosec #pentest #redteam #blueteam specterops.io/blog/2025/11/0โ€ฆ

Nana Sei Anyemedu (@redhatpentester) 's Twitter Profile Photo

It reminds me of earlier this year when I shared an investigation done with a particular industry tool, and someone quoted the post insisting it was Autopsy. He even claimed he works with the government and bet that Autopsy couldnโ€™t do what I demonstrated simply because thatโ€™s

Unit 42 (@unit42_intel) 's Twitter Profile Photo

We review digital risk through the capabilities of malicious LLMs, using WormGPT and KawaiiGPT as examples. This discussion of LLMs as a cybercrime-as-a-service product stresses the call for accountability from developers, regulators and researchers. bit.ly/480laYa

We review digital risk through the capabilities of malicious LLMs, using WormGPT and KawaiiGPT as examples. This discussion of LLMs as a cybercrime-as-a-service product stresses the call for accountability from developers, regulators and researchers. bit.ly/480laYa
๐• Bug Bounty Writeups ๐• (@bountywriteups) 's Twitter Profile Photo

How I Discovered an IDOR Vulnerability in a Parent/Child Management API infosecwriteups.com/how-i-discoverโ€ฆ #bugbounty #bugbountytips #bugbountytip

JPCERT/CC (@jpcert_en) 's Twitter Profile Photo

Registration for #JSAC2026 is now open! Visit the website for details. Seats are reserved on a first-come, first-serve basis. Make sure to register early if you wish to attend! ^SY jsac.jpcert.or.jp/en/registratioโ€ฆ

Cyber_OSINT (@cyber_o51nt) 's Twitter Profile Photo

Scattered Lapsus$ Hunters are reportedly intensifying the sale of compromised FortiOS access on DarkForums, with a focus on Central and South America, identifying 24 distinct victims including a major real estate firm in El Salvador. devel.group/blog/scatteredโ€ฆ

Khaleej Times (@khaleejtimes) 's Twitter Profile Photo

#BreakingNews The safety inspections and required maintenance on #AirbusA320 aircraft is underway, the #UAE regulator confirmed to #KhaleejTimes on Saturday. khaleejtimes.com/uae/airbus-a32โ€ฆ

#BreakingNews 
The safety inspections and required maintenance on #AirbusA320 aircraft is underway, the #UAE regulator confirmed to #KhaleejTimes on Saturday.

khaleejtimes.com/uae/airbus-a32โ€ฆ
0xdf (@0xdf_) 's Twitter Profile Photo

Era from Hack The Box has multiple IDOR vulnerabilities followed by a PHP injection invoking the PHP SSH module to run commands on the host. Then there's a signed Linux binary to negotiate for root. 0xdf.gitlab.io/2025/11/29/htbโ€ฆ