duckie (@n0tduck1e) 's Twitter Profile
duckie

@n0tduck1e

likes malware | does blue+red team things | OSCP

check out my rarely updated blog 👇🏻👇🏻👇🏻

ID: 803647654617956352

linkhttps://n0tduck1e.github.io/ calendar_today29-11-2016 17:11:46

3,3K Tweet

289 Followers

1,1K Following

0xdf (@0xdf_) 's Twitter Profile Photo

AirTouch from Hack The Box is a wireless box featuring SNMP enumeration, WPA2-PSK capture and crack, WireShark traffic decryption, client-side cookie role bypass with a phtml upload, and an evil twin via eaphammer to capture a crackable challenge. 0xdf.gitlab.io/2026/04/18/htb…

Kye Gomez (swarms) (@kyegomezb) 's Twitter Profile Photo

Introducing OpenMythos An open-source, first-principles theoretical reconstruction of Claude Mythos, implemented in PyTorch. The architecture instantiates a looped transformer with a Mixture-of-Experts (MoE) routing mechanism, enabling iterative depth via weight sharing and

Introducing OpenMythos

An open-source, first-principles theoretical reconstruction of Claude Mythos, implemented in PyTorch.

The architecture instantiates a looped transformer with a Mixture-of-Experts (MoE) routing mechanism, enabling iterative depth via weight sharing and
The Linux Foundation (@linuxfoundation) 's Twitter Profile Photo

⏰ CFP reminder: submissions for #AGNTCon + #MCPCon North America close June 7! Share your work on agent architectures, MCP design, multi-agent systems, security, evals & more. San Jose, Oct. 22-23. Submit → bit.ly/4tFfCdz

⏰ CFP reminder: submissions for #AGNTCon + #MCPCon North America close June 7! Share your work on agent architectures, MCP design, multi-agent systems, security, evals & more. San Jose, Oct. 22-23. Submit → bit.ly/4tFfCdz
Julian Horoszkiewicz (@ewilded) 's Twitter Profile Photo

Finally, it is published 😁 Making Vulnerable Drivers Exploitable Without Hardware - my latest research on driver vulnerability hardware-gating, explaining the concept of hardware-dependent code and diving deep into creative deployment techniques - software-emulated phantom

Alexander Popov (@a13xp0p0v) 's Twitter Profile Photo

My new article: "Some notes on the security properties of the pipe_buffer kernel object" Many Linux kernel exploits use the pipe_buffer kernel object to build strong exploit primitives. I experimented with pipe_buffers and discovered something interesting a13xp0p0v.tech/2026/04/20/pip…

My new article: "Some notes on the security properties of the pipe_buffer kernel object"

Many Linux kernel exploits use the pipe_buffer kernel object to build strong exploit primitives. I experimented with pipe_buffers and discovered something interesting a13xp0p0v.tech/2026/04/20/pip…
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Security properties of the Linux kernel pipe_buffer object for building exploit primitives by Alexander Popov a13xp0p0v.github.io/2026/04/20/pip… #infosec

Security properties of the Linux kernel pipe_buffer object for building exploit primitives by <a href="/a13xp0p0v/">Alexander Popov</a>

a13xp0p0v.github.io/2026/04/20/pip…

#infosec
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Find zero-days while you sleep. DeepZero is an automated vulnerability research framework that parses, decompiles, and analyzes thousands of Windows kernel drivers for exploitable IOCTLs natively using AI agents. github.com/416rehman/Deep…

Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Offensive security knowledge base — 50+ docs covering web exploitation, bug bounty, privilege escalation, CTF writeups, APT emulation, and forensics. Real payloads, real workflows, built from the field. github.com/Abdowaer098/Wa…

duckie (@n0tduck1e) 's Twitter Profile Photo

firefox 150 AI changes broke my system dark theme compatibility. AI slop 😭😭 It's not even something weird just adwaita dark