Grimmjow (@neocyberx) 's Twitter Profile
Grimmjow

@neocyberx

EDR | Malware | TH

ID: 1840965778910429187

calendar_today01-10-2024 04:03:58

264 Tweet

31 Followers

172 Following

The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

โšก ๐—ก๐—ผ๐˜„ ๐—š๐—ฒ๐˜ ๐Ÿต๐Ÿฌ% ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ผ๐—ป ๐˜๐—ต๐—ฒ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ (๐—–๐—ก๐—ฃ๐—ฒ๐—ป) ๐—˜๐˜…๐—ฎ๐—บ!ย โšก ๐˜š๐˜ถ๐˜ฑ๐˜ฆ๐˜ณ๐˜ค๐˜ฉ๐˜ข๐˜ณ๐˜จ๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ๐˜ณ ๐™‰๐™š๐™ฉ๐™ฌ๐™ค๐™ง๐™  ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข๐˜ฏ ๐˜ช๐˜ฏ๐˜ค๐˜ณ๐˜ฆ๐˜ฅ๐˜ช๐˜ฃ๐˜ญ๐˜ฆ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ณ! ๐Ÿ‘ ๐™‡๐™ž๐™ ๐™š, ๐Ÿ”

โšก ๐—ก๐—ผ๐˜„ ๐—š๐—ฒ๐˜ ๐Ÿต๐Ÿฌ% ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜‚๐—ป๐˜ ๐—ผ๐—ป ๐˜๐—ต๐—ฒ ๐—–๐—ฒ๐—ฟ๐˜๐—ถ๐—ณ๐—ถ๐—ฒ๐—ฑ ๐—ก๐—ฒ๐˜๐˜„๐—ผ๐—ฟ๐—ธ ๐—ฃ๐—ฒ๐—ป๐˜๐—ฒ๐˜€๐˜๐—ฒ๐—ฟ (๐—–๐—ก๐—ฃ๐—ฒ๐—ป) ๐—˜๐˜…๐—ฎ๐—บ!ย โšก
๐˜š๐˜ถ๐˜ฑ๐˜ฆ๐˜ณ๐˜ค๐˜ฉ๐˜ข๐˜ณ๐˜จ๐˜ฆ ๐˜บ๐˜ฐ๐˜ถ๐˜ณ ๐™‰๐™š๐™ฉ๐™ฌ๐™ค๐™ง๐™  ๐™Ž๐™š๐™˜๐™ช๐™ง๐™ž๐™ฉ๐™ฎ ๐˜ด๐˜ฌ๐˜ช๐˜ญ๐˜ญ๐˜ด ๐˜ธ๐˜ช๐˜ต๐˜ฉ ๐˜ข๐˜ฏ ๐˜ช๐˜ฏ๐˜ค๐˜ณ๐˜ฆ๐˜ฅ๐˜ช๐˜ฃ๐˜ญ๐˜ฆ ๐˜ฐ๐˜ง๐˜ง๐˜ฆ๐˜ณ!

๐Ÿ‘ ๐™‡๐™ž๐™ ๐™š, ๐Ÿ”
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

Weโ€™ve just published a new blog that takes a deep dive into ๐—–๐—ก๐—ฃ๐—ฒ๐—ป ๐˜ƒ๐˜€ ๐—ข๐—ฆ๐—–๐—ฃ ๐Ÿค breaking down the ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฎ๐—ถ๐—ป, ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜, ๐—ฐ๐—ผ๐˜€๐˜, ๐—ฎ๐—ป๐—ฑ ๐—ฟ๐—ฒ๐—ฎ๐—น-๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฝ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—ถ๐˜๐˜† so you can decide which certification truly fits your path

Weโ€™ve just published a new blog that takes a deep dive into ๐—–๐—ก๐—ฃ๐—ฒ๐—ป ๐˜ƒ๐˜€ ๐—ข๐—ฆ๐—–๐—ฃ ๐Ÿค breaking down the ๐˜€๐—ธ๐—ถ๐—น๐—น๐˜€ ๐˜†๐—ผ๐˜‚ ๐—ด๐—ฎ๐—ถ๐—ป, ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ณ๐—ผ๐—ฟ๐—บ๐—ฎ๐˜, ๐—ฐ๐—ผ๐˜€๐˜, ๐—ฎ๐—ป๐—ฑ ๐—ฟ๐—ฒ๐—ฎ๐—น-๐˜„๐—ผ๐—ฟ๐—น๐—ฑ ๐—ฝ๐—ฟ๐—ฎ๐—ฐ๐˜๐—ถ๐—ฐ๐—ฎ๐—น๐—ถ๐˜๐˜† so you can decide which certification truly fits your path
vx-underground (@vxunderground) 's Twitter Profile Photo

> be employee > work at Atlassian > 10am > get promotion > celebrate on LinkedIn > new career milestone > overwhelming joy and pride > 2pm > get email > position promoted to being cut > laid off > promoted and laid off in same day

> be employee
> work at Atlassian
> 10am
> get promotion 
> celebrate on LinkedIn 
> new career milestone 
> overwhelming joy and pride
> 2pm
> get email 
> position promoted to being cut
> laid off
> promoted and laid off in same day
HackerRats - Uncle Rat โค๏ธ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Most hacking courses teach one slice. One vuln. One tool. One trick. Real operators need the whole stack. 905 Complete Course Offering Bundle 35 products. Web. APIs. Recon. XSS. XXE. BAC. Burp. WAFs. Methodology. Live training. This isnโ€™t a course. Itโ€™s a full offensive

Most hacking courses teach one slice.

One vuln.
One tool.
One trick.

Real operators need the whole stack.

905 Complete Course Offering Bundle

35 products.
Web. APIs. Recon. XSS. XXE. BAC. Burp. WAFs. Methodology. Live training.

This isnโ€™t a course.

Itโ€™s a full offensive
HackerRats - Uncle Rat โค๏ธ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Stop โ€œtrying harderโ€ for OSCP. Start using a system. Hacker Blueprint helps you: โ†’ Build a real pentesting methodology โ†’ Practice on exam-like AD labs โ†’ Eliminate guesswork with structured notes This is how people actually pass. Check it out ๐Ÿ‘‡ hackerblueprint.pages.dev

vx-underground (@vxunderground) 's Twitter Profile Photo

Another zero day exploit released by some nerd (can't remember name right now) because they're annoyed with Microsoft. It's been confirmed by other nerds. It is yet another legit zero day. Whew. github.com/Nightmare-Ecliโ€ฆ

Huntress (@huntresslabs) 's Twitter Profile Photo

The Huntress SOC is observing the use of Nightmare-Eclipse's BlueHammer, RedSun, and UnDefend exploitation techniques. Investigation by: Tanner, Curity, + John Hammond ๐Ÿงต๐Ÿ‘‡

The Huntress SOC is observing the use of Nightmare-Eclipse's BlueHammer, RedSun, and UnDefend exploitation techniques.

Investigation by: <a href="/wbmmfq/">Tanner</a>, <a href="/Curity4201/">Curity</a>, + <a href="/_JohnHammond/">John Hammond</a> ๐Ÿงต๐Ÿ‘‡
rootsecdev (@rootsecdev) 's Twitter Profile Photo

I too woke up and choose violence today as the fail-copy POC dropped. Made a clean exploit including fixing the UID post exploitation without rebooting the target server. Smoke those CTFโ€™s in hack the box. github.com/rootsecdev/cveโ€ฆ

The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐Ÿ’ผ ๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ ๐—ข๐˜‚๐˜ ๐—ฎ๐˜€ ๐—ฎ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ฒ๐—ซ๐—ฝ๐—ฒ๐—ฟ๐˜ | ๐—–๐—•๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐—ซ ๐—ก๐—ผ๐˜„ ๐—”๐˜ ๐Ÿต๐Ÿฌ% ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜‚๐—ป๐˜! ๐Ÿฏ ๐—ฝ๐—ฎ๐—ฟ๐˜๐—ถ๐—ฐ๐—ถ๐—ฝ๐—ฎ๐—ป๐˜๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ฏ๐—ฒ ๐˜€๐—ฒ๐—น๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—ฐ๐—ฒ๐—ถ๐˜ƒ๐—ฒ ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—–๐—•๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐—ซ ๐—ฒ๐˜…๐—ฎ๐—บ. ๐˜“๐˜ช๐˜ฌ๐˜ฆ ๐Ÿ‘

๐Ÿ’ผ ๐—ฆ๐˜๐—ฎ๐—ป๐—ฑ ๐—ข๐˜‚๐˜ ๐—ฎ๐˜€ ๐—ฎ ๐—•๐—น๐˜‚๐—ฒ ๐—ง๐—ฒ๐—ฎ๐—บ ๐—ฒ๐—ซ๐—ฝ๐—ฒ๐—ฟ๐˜ | ๐—–๐—•๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐—ซ ๐—ก๐—ผ๐˜„ ๐—”๐˜ ๐Ÿต๐Ÿฌ% ๐——๐—ถ๐˜€๐—ฐ๐—ผ๐˜‚๐—ป๐˜!

๐Ÿฏ ๐—ฝ๐—ฎ๐—ฟ๐˜๐—ถ๐—ฐ๐—ถ๐—ฝ๐—ฎ๐—ป๐˜๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ฏ๐—ฒ ๐˜€๐—ฒ๐—น๐—ฒ๐—ฐ๐˜๐—ฒ๐—ฑ ๐˜๐—ผ ๐—ฟ๐—ฒ๐—ฐ๐—ฒ๐—ถ๐˜ƒ๐—ฒ ๐—™๐—ฅ๐—˜๐—˜ ๐—ฎ๐—ฐ๐—ฐ๐—ฒ๐˜€๐˜€ ๐˜๐—ผ ๐˜๐—ต๐—ฒ ๐—–๐—•๐—ง๐—ฒ๐—ฎ๐—บ๐—ฒ๐—ฟ๐—ซ ๐—ฒ๐˜…๐—ฎ๐—บ.
๐˜“๐˜ช๐˜ฌ๐˜ฆ ๐Ÿ‘
HackTricks (@hacktricks_live) 's Twitter Profile Photo

LinPEAS is now capable of detecting if a machine is vulnerable to Copy Fail vuln (CVE-2026-31431). Enjoy it! github.com/peass-ng/peasSโ€ฆ

The DFIR Report (@thedfirreport) 's Twitter Profile Photo

๐ŸŽ DFIR Labs Giveaway โ€” tomorrow. We're giving away free cases and subscriptions to members of the DFIR Labs Discord server. Multiple winners! To participate: join the DFIR Labs Discord server before tomorrow's drawing. Already a member? You're in. ๐Ÿ‘‰ discord.gg/VmwpGpB5h6

๐ŸŽ DFIR Labs Giveaway โ€” tomorrow.

We're giving away free cases and subscriptions to members of the DFIR Labs Discord server. Multiple winners!

To participate: join the DFIR Labs Discord server before tomorrow's drawing. Already a member? You're in.
๐Ÿ‘‰ discord.gg/VmwpGpB5h6
๐‡๐š๐ฆ๐ณ๐š๐ŸŒ… (@hamzaonchain) 's Twitter Profile Photo

Ten certifications in digital forensics: 1. Certified Computer Examiner (CCE) 2. GIAC Certified Forensic Analyst (GCFA) 3. Certified Forensic Computer Examiner (CFCE) 4. EnCase Certified Examiner (EnCE) 5. Certified Cyber Forensics Professional (CCFP) 6. GIAC Certified Forensic