JohnDCyber (@johndcyber) 's Twitter Profile
JohnDCyber

@johndcyber

Senior Pentester, Cyber Security Instructor, Cloud Security Researcher and Blogger.

ID: 1394071433295417346

linkhttp://johndcyber.com calendar_today16-05-2021 23:25:19

59 Tweet

38 Followers

387 Following

Smukx.E (@5mukx) 's Twitter Profile Photo

Malware Analysis series by zhassulan zhussupov Part 1 : cocomelonc.github.io/tutorial/2021/… Part 2 : cocomelonc.github.io/tutorial/2021/… Part 3 : cocomelonc.github.io/tutorial/2022/… Part 4 : cocomelonc.github.io/tutorial/2022/… Part 6 : cocomelonc.github.io/malware/2022/1… Part 7 : cocomelonc.github.io/malware/2023/0… Part 8 : cocomelonc.github.io/malware/2023/0…

Malware Analysis series by <a href="/cocomelonckz/">zhassulan zhussupov</a> 

Part 1 : cocomelonc.github.io/tutorial/2021/…
Part 2 : cocomelonc.github.io/tutorial/2021/…
Part 3 : cocomelonc.github.io/tutorial/2022/…
Part 4 : cocomelonc.github.io/tutorial/2022/…
Part 6 : cocomelonc.github.io/malware/2022/1…
Part 7 : cocomelonc.github.io/malware/2023/0…
Part 8 : cocomelonc.github.io/malware/2023/0…
nyxgeek (@nyxgeek) 's Twitter Profile Photo

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems. On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.
Clint Gibler (@clintgibler) 's Twitter Profile Photo

Two new open source cloud security tools from Permiso Security 🔪 SkyScalpel: Combat Policy Obfuscation in Cloud Environments permiso.io/blog/introduci… ☁️ CloudTail: Long-term Cloud Log Retention and Searchability permiso.io/blog/introduci…

Two new open source cloud security tools from <a href="/permisosecurity/">Permiso Security</a>

🔪 SkyScalpel: Combat Policy Obfuscation in Cloud Environments

permiso.io/blog/introduci…

☁️ CloudTail: Long-term Cloud Log Retention and Searchability

permiso.io/blog/introduci…
Bert-Jan 🛡️ (@bertjancyber) 's Twitter Profile Photo

Latest #KQL additions: 1 Large Number of Azure VMs started 2 DFIR: Mails accessed by compromised account 3 MDE Advanced Feature Disabled github.com/Bert-JanP/Hunt…

VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Email Verification Bypasses ? Here are 10 Blogs about Email Verification Vulnerabilites ! 1. medium.com/@mohamed.yasse… 2. medium.com/@akrachliy/ema… 3. shrirangdiwakar.medium.com/how-i-turned-0… 4. mo9khu93r.medium.com/discovered-a-u… 5. medium.com/@mo9khu93r/how… 6. bevijaygupta.medium.com/email-verifica… 7.

bugcrowd (@bugcrowd) 's Twitter Profile Photo

How to brute-force directories with Gobuster: 🪲 gobuster dir -u <target-URL> -w ./directories.txt dir: Directory scanning mode -u: Target URL -w: Path to wordlist file Install Gobuster: github.com/OJ/gobuster

Aurimas Griciūnas (@aurimas_gr) 's Twitter Profile Photo

What is a 𝗩𝗲𝗰𝘁𝗼𝗿 𝗗𝗮𝘁𝗮𝗯𝗮𝘀𝗲? With the rise of Foundational Models, Vector Databases skyrocketed in popularity. The truth is that a Vector Database is also useful outside of a Large Language Model context. When it comes to Machine Learning, we often deal with Vector

Rudy Ooms | MVP 🇳🇱 (@mister_mdm) 's Twitter Profile Photo

Local Administrator Protection is Here!!!! At #Ignite2024 , #Microsoft finally officially announced the Local Administrator Protection feature for #Windows11! This game-changing update replaces traditional admin accounts with just-in-time privileges, securing admin rights like

Local Administrator Protection is Here!!!!

At #Ignite2024 , #Microsoft finally officially announced the Local Administrator Protection feature for #Windows11! This game-changing update replaces traditional admin accounts with just-in-time privileges, securing admin rights like
Tom Dörr (@tom_doerr) 's Twitter Profile Photo

MarkItDown: A Python library by Microsoft to convert various file formats (Word, PowerPoint, Excel, PDF, images, audio, HTML, JSON, XML, CSV, ZIP) into Markdown, using OCR and speech recognition for multimedia files

MarkItDown: A Python library by Microsoft to convert various file formats (Word, PowerPoint, Excel, PDF, images, audio, HTML, JSON, XML, CSV, ZIP) into Markdown, using OCR and speech recognition for multimedia files
JohnDCyber (@johndcyber) 's Twitter Profile Photo

🔐 Check out my latest article on johndcyber.com! 🚀 This SPF, DKIM, DMARC Scanner can detect misconfigurations, secure your email domain, and prevent spoofing attacks. Read more here: johndcyber.com/harden-your-em… #EmailSecurity #CyberSecurity

JohnDCyber (@johndcyber) 's Twitter Profile Photo

A quick and dirtytool for discovering domains that are missing or misconfiguring SPF, DKIM, and DMARC records. Security folks can use this tool to quickly locate insecure domains and reduce spoofing risks in their environments. github.com/johdcyber/DKII…

JohnDCyber (@johndcyber) 's Twitter Profile Photo

This tool scans Azure Active Directory for all tenant-wide app registrations, evaluates their permissions, and generates a risk report in CSV, JSON, and interactive HTML formats. It also provides details on certificate and secret status, creation dates,etc github.com/johdcyber/Azur…

JohnDCyber (@johndcyber) 's Twitter Profile Photo

Privilege escalation is a critical post-exploitation goal for attackers within Windows environments. One emerging vector is Active Directory Certificate Services (ADCS), which has been revealed as a powerful yet often misconfigured attack surface. github.com/johdcyber/win_…

JohnDCyber (@johndcyber) 's Twitter Profile Photo

“SharePoint Security Best Practices: Hardening Your Collaboration Platform Against Enumeration…” by John D Cyber johndcyber.com/sharepoint-sec…

“SharePoint Security Best Practices: Hardening Your Collaboration Platform Against Enumeration…” by John D Cyber johndcyber.com/sharepoint-sec…
tyllen (@0xtyllen) 's Twitter Profile Photo

If you're building AI agents, read this twice: There’s a new invisible OS being written for the autonomous future. It’s built on two emerging protocols: • Model Context Protocol (MCP) • Agent-to-Agent Protocol (A2A) Here’s why they’re a big deal—and why you need to care:

If you're building AI agents, read this twice:

There’s a new invisible OS being written for the autonomous future. It’s built on two emerging protocols:

• Model Context Protocol (MCP)
• Agent-to-Agent Protocol (A2A)

Here’s why they’re a big deal—and why you need to care:
Aryan Mahajan (@aryanxmahajan) 's Twitter Profile Photo

This AI Agent replaces your $200K/Year Marketing team while I was eating shawarma at 2am, it scraped 6 platforms, analyzed 73 comment threads, and handed me 9 deploy-ready scripts. It stalks your niche, steals what’s working, and turns it into viral content built to print

This AI Agent replaces your $200K/Year Marketing team

while I was eating shawarma at 2am, it scraped 6 platforms, analyzed 73 comment threads, and handed me 9 deploy-ready scripts.

It stalks your niche, steals what’s working, and turns it into viral content built to print