José Rosales (@josrosa36233826) 's Twitter Profile
José Rosales

@josrosa36233826

Free Palestine

ID: 1138899425240190977

calendar_today12-06-2019 20:02:37

565 Tweet

80 Takipçi

2,2K Takip Edilen

Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

Understanding the #pe file format is key to #reverse #engineering windows executables. If you need help, I have a playlist with over 4 hours of content covering many of the most important aspects on #youtube 👇 ▶️ youtube.com/playlist?list=…

Understanding the #pe file format is key to #reverse #engineering windows executables. If you need help, I have a playlist with over 4 hours of content covering many of the most important aspects on #youtube 👇

▶️ youtube.com/playlist?list=…
Josh Stroschein | The Cyber Yeti (@jstrosch) 's Twitter Profile Photo

If you're looking to learn #malware or #reversing , I have a couple of #github repos that can help 👇 👿 github.com/jstrosch/learn… 🛠️ github.com/jstrosch/learn… Source code that you can compile to help w/ deeper understanding - many link to videos on #youtube as well!

If you're looking to learn #malware or #reversing , I have a couple of #github repos that can help 👇

👿 github.com/jstrosch/learn…

🛠️ github.com/jstrosch/learn…

Source code that you can compile to help w/ deeper understanding - many link to videos on #youtube as well!
Nikhil Mittal (@nikhil_mitt) 's Twitter Profile Photo

🚨 I am giving away 1 seat each of our June Red team (CRTP) and Azure (CARTP) bootcamps. 🚨 Repost, like and reply to this tweet to participate. I will announce the winners on Monday (27th May). alteredsecurity.com/bootcamps #redteam #pentest #giveaway

🚨 I am giving away 1 seat each of our June Red team (CRTP) and Azure (CARTP) bootcamps. 🚨

Repost, like and reply to this tweet to participate. I will announce the winners on Monday (27th May). 

alteredsecurity.com/bootcamps

#redteam #pentest #giveaway
RedBird Seguridad Ofensiva (@redbirdoficial) 's Twitter Profile Photo

¿Un reto de investigación? Chronophoto es un sitio web donde debes investigar la fecha de una imagen que te muestran (generalmente películas) -Chronophoto - Game chronophoto.app/game.html #OSINT #IMINT

¿Un reto de investigación?
Chronophoto es un sitio web donde debes investigar la fecha de una imagen que te muestran (generalmente películas)

-Chronophoto - Game chronophoto.app/game.html

#OSINT #IMINT
nao_sec (@nao_sec) 's Twitter Profile Photo

New blog post! DarkPeony (related to SmugX campaign) started to execute #PlugX using MSC file 🤔 jp.security.ntt/tech_blog/cont…

New blog post! DarkPeony (related to SmugX campaign) started to execute #PlugX using MSC file 🤔
jp.security.ntt/tech_blog/cont…
Bilal (@0xcc00) 's Twitter Profile Photo

You've gained Domain Admin privileges, but an EDR is blocking your attempts to dump the entire domain's hashes. In this article, I'll share a technique I used to bypass this obstacle. medium.com/@0xcc00/bypass…

vx-underground (@vxunderground) 's Twitter Profile Photo

Nerds are reporting Lockbit ransomware group's blog now requires a blog access key to visit it. The blog access key: NDWZ3NXU66EWUFBMJWQOC2FXIIHFZFKZRULHBGAYFYX4HEIDRF5Q Have a nice day

Adrián Díaz (@s4dbrd) 's Twitter Profile Photo

Hello! I've just uploaded a new post discussing techniques for evading ETW-based detections, including tampering, hijacking sessions, and patching ETW functions :) Please enjoy s4dbrd.com/evading-etw-ba…

Colin McCarthy (@us_stormwatch) 's Twitter Profile Photo

12-hour timelapse of American Airlines, Delta, and United plane traffic after what was likely the biggest IT outage in history forced a nationwide ground stop of the three airlines.

Aurélien Chalot (@defte_) 's Twitter Profile Photo

For that need, I wrote a quick Python script that will bind to an interface and build subnets file based on incoming packets: gist.github.com/Dfte/9cfeb8789… was very useful lately 👀

For that need, I wrote a quick Python script that will bind to an interface and build subnets file based on incoming packets: gist.github.com/Dfte/9cfeb8789… was very useful lately 👀
Germán Fernández (@1zrr4h) 's Twitter Profile Photo

Nueva campaña de #FenixBotnet dirigida a México 🇲🇽 Ahora también utilizando la técnica "Copy&Paste" Distribución a través de SMS con URL: ▪ https://sat[.]citatorio[.]com/file/declaracion.pdf (falso PDF). Siguientes etapas desde: ▪ https://d3f8cv[.]top/d1zK3flPWA/v.txt ▪

Nueva campaña de #FenixBotnet dirigida a México 🇲🇽
Ahora también utilizando la técnica "Copy&Paste"

Distribución a través de SMS con URL:
▪ https://sat[.]citatorio[.]com/file/declaracion.pdf (falso PDF).

Siguientes etapas desde:
▪ https://d3f8cv[.]top/d1zK3flPWA/v.txt
▪
Lampros (@lampnout) 's Twitter Profile Photo

Did you know attackers can register scheduled tasks configured with a custom handler (COM) to hide the full path of their payload? In my revisited post I explore (source code) how it is possible to register a task using the IComHandlerAction interface stmxcsr.com/persistence/sc…

Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

a free tool that lists open s3 buckets and helps you search for interesting files.⚔️ - buckets.grayhatwarfare.com - grayhatwarfare.medium.com/how-to-search-… #infosec #cybersec #bugbountytips

a free tool that lists open s3 buckets and helps you search for interesting files.⚔️

-  buckets.grayhatwarfare.com

- grayhatwarfare.medium.com/how-to-search-…

#infosec #cybersec #bugbountytips
Or Yair (@oryair1999) 's Twitter Profile Photo

Excited to release LDAPNightmare! The first PoC tool exploiting CVE-2024-49112 that I created with Shak Mo ! Check out the repo and blog post detailing about the vulnerability: github.com/SafeBreach-Lab… Honored to be a part of the SafeBreach labs team once again🫠

I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

Bad news, my friends: my polymorphic reverse shell generator’s a legal no-no. 😭 Gooder news: I’ve unleashed this PowerShell Obfuscator to "protect" your scripts! 🎉 Check it out: powershellforhackers.com/tools/obfuscat… Oh, and totally unrelated, there’s a new payload example on my

Bad news, my friends: my polymorphic reverse shell generator’s a legal no-no. 😭

Gooder news: I’ve unleashed this PowerShell Obfuscator to "protect" your scripts! 🎉 

Check it out: powershellforhackers.com/tools/obfuscat… 

Oh, and totally unrelated, there’s a new payload example on my
Andrew Oliveau (@andrewoliveau) 's Twitter Profile Photo

RemoteMonologue - A Windows credential harvesting attack that leverages the Interactive User RunAs key and coerces NTLM authentications via DCOM. Remotely compromise users without moving laterally or touching LSASS. Hope you enjoy the blog & tool drop 🤟 ibm.com/think/x-force/…

Aurélien Chalot (@defte_) 's Twitter Profile Photo

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D Blogpost: sensepost.com/blog/2025/is-t… Tool: github.com/fortra/impacke… And also, big thanks to jmk (Joe Mondloch) for the collab' :D!

You have got a valid NTLM relay but SMB and LDAP are signed, LDAPS has got Channel Binding and ESC8 is not available... What about WinRMS ? :D

Blogpost: sensepost.com/blog/2025/is-t…
Tool: github.com/fortra/impacke…

And also, big thanks to jmk (Joe Mondloch) for the collab' :D!
Ruben Groenewoud (@rfgroenewoud) 's Twitter Profile Photo

🐧 After 6 months of research, my 5-part Linux Persistence series is now complete!🐧 🧵 Full series below👇 1️⃣elastic.co/security-labs/… 2️⃣elastic.co/security-labs/… 3️⃣elastic.co/security-labs/… 4️⃣elastic.co/security-labs/… 5️⃣elastic.co/security-labs/… #Linux #Persistence #redteam #Elastic