Pratik Mahale (@pratikmahale007) 's Twitter Profile
Pratik Mahale

@pratikmahale007

Cyber Threat Intelligence Expert and Reversing Malware.

ID: 283427764

calendar_today17-04-2011 08:19:19

1,1K Tweet

149 Takipรงi

745 Takip Edilen

Cyber Crimes Conclave (@cybercrimeconcl) 's Twitter Profile Photo

"The internet is often compared to an iceberg. The surface web, containing commonly used websites, represents only the tip and makes up a small portion (around 10%). Below the surface lies the deep web, consisting of non-indexed content like private accounts.

"The internet is often compared to an iceberg. The surface web, containing commonly used websites, represents only the tip and makes up a small portion (around 10%). Below the surface lies the deep web, consisting of non-indexed content like private accounts.
Pratik Mahale (@pratikmahale007) 's Twitter Profile Photo

๐ŸšจA massive data breach at boAt Lifestyle of over 7.5 Million customer details like name, email address, phone number, address etc . Note : If you have an account on boAt Lifestyle you should change your password immediately. #boat #dataleak #threatIntel Aman Gupta

๐ŸšจA massive data breach at boAt Lifestyle of over 7.5 Million customer details like name, email address, phone number, address etc .

Note : If you have an account on boAt Lifestyle you should change your password immediately.
#boat #dataleak #threatIntel <a href="/amangupta0303/">Aman Gupta</a>
Levina๐Ÿ‡ฎ๐Ÿ‡ณ (@levinaneythiri) 's Twitter Profile Photo

The most awesome thing I saw today. India from space โฃ๏ธ๐Ÿ‡ฎ๐Ÿ‡ณ The giant Himalaya, Vindhya, Satpura, eastern & western ghats, and the Aravllisโ€ฆ this is what makes INDIA , the India it is. The eternal beings of the subcontinent. โค๏ธ

mbg (@mbrg0) 's Twitter Profile Photo

we got an ~RCE on M365 Copilot by sending an email by ~RCE I mean full remote control over its actions - search for sensitive content (sharepoint, email, calendar, teams), execute plugins and outputs - bypass DLP controls, manipulate references, social engineer its users on our

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

Windows Kernel Exploitation Tutorial 1: Setup rootkits.xyz/blog/2017/06/kโ€ฆ 2: Stack Overflow rootkits.xyz/blog/2017/08/kโ€ฆ 3: Memory Overwrite rootkits.xyz/blog/2017/09/kโ€ฆ 4: Pool Overflow rootkits.xyz/blog/2017/11/kโ€ฆ 5: NULL Pointer Dereference rootkits.xyz/blog/2018/01/kโ€ฆ #infosec

Windows Kernel Exploitation Tutorial   

1: Setup 
rootkits.xyz/blog/2017/06/kโ€ฆ 

2: Stack Overflow 
rootkits.xyz/blog/2017/08/kโ€ฆ 

3: Memory Overwrite 
rootkits.xyz/blog/2017/09/kโ€ฆ 

4: Pool Overflow 
rootkits.xyz/blog/2017/11/kโ€ฆ 

5: NULL Pointer Dereference 
rootkits.xyz/blog/2018/01/kโ€ฆ

#infosec
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

IOS Pentesting Series Learn how to work with useful tools and apps such as Frida, Objection, 3uTools, Cydia, Burp, fsmon, fridump, SSL bypass, reFlutter etc. Part 1: ๐Ÿ”—kishorbalan.medium.com/start-your-firโ€ฆ Part 2: ๐Ÿ”—kishorbalan.medium.com/ios-pentestingโ€ฆ Part 3: ๐Ÿ”—kishorbalan.medium.com/ios-pentestingโ€ฆ

OccupytheWeb (@three_cube) 's Twitter Profile Photo

Both the Chinese and US Intelligence are listening to Your Calls and reading Your Messages! Recent technological developments make it easier and cheaper to build your own private cellular network! Learn how the Mexican drug cartels did it! hackers-arise.com/post/mobile-haโ€ฆ

Defused (@defusedcyber) 's Twitter Profile Photo

โš ๏ธ Ivanti fingerprinting occuring from multiple IP addresses The attackers are enumerating versions for certain build artifacts in Ivanti EPMM Specifically, various paths under "/mifs/scripts/mifs-legacy-common-[version]-SNAPSHOT-all-min.js" are being accessed for matches

โš ๏ธ Ivanti fingerprinting occuring from multiple IP addresses 

The attackers are enumerating versions for certain build artifacts in Ivanti EPMM

Specifically, various paths under "/mifs/scripts/mifs-legacy-common-[version]-SNAPSHOT-all-min.js" are being accessed for matches
Md Ismail ล ojal๎จ€ ๐Ÿ•ท๏ธ (@0x0sojalsec) 's Twitter Profile Photo

100+ N8N Security workflow & automationโœจ For Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks. - github.com/0xSojalSec/n8nโ€ฆ #infosec #cybersec #bugbounty

100+ N8N Security workflow &amp; automationโœจ

For Red/Blue/AppSec workflows, integrations, and ready-to-run playbooks.

- github.com/0xSojalSec/n8nโ€ฆ

#infosec #cybersec #bugbounty
Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Stop manual LOLBin hunts! ๐Ÿ•ต๏ธ Use Google TI Advanced Searches to catch stealthy tools. ๐Ÿš€ #GoogleTIMondays #lolbins

Conflict Monitor (@conflictmoniter) 's Twitter Profile Photo

๐Ÿ‡ฎ๐Ÿ‡ท ๐‘๐„๐๐Ž๐‘๐“ | Attempted to create an exhaustive list of all the attacks carried out by Iranian forces and their allies on Coalition forces in West Asia. These reports are based on twitter/telegram reports from various OSINT accounts.

๐Ÿ‡ฎ๐Ÿ‡ท ๐‘๐„๐๐Ž๐‘๐“ | Attempted to create an exhaustive list of all the attacks carried out by Iranian forces and their allies on Coalition forces in West Asia. These reports are based on twitter/telegram reports from various OSINT accounts.
Nav Singh (@heynavsingh) 's Twitter Profile Photo

๐Ÿšจ Someone just turned your WiFi router into a full-body surveillance system. No cameras. No wearables. No video. Just radio waves. It's called RuView. It uses the WiFi signals already in your room to detect human poses, track breathing, measure heart rate, and see through

๐Ÿšจ Someone just turned your WiFi router into a full-body surveillance system.

No cameras. No wearables. No video. Just radio waves.

It's called RuView. It uses the WiFi signals already in your room to detect human poses, track breathing, measure heart rate, and see through
HackManac (@h4ckmanac) 's Twitter Profile Photo

For the past seven days we have been closely monitoring the cyber dimension of the ongoing tensions in the Middle East. Today we are introducing a new weekly intelligence snapshot: the ๐‡๐š๐œ๐ค๐ฆ๐š๐ง๐š๐œ ๐Œ๐ข๐๐๐ฅ๐ž ๐„๐š๐ฌ๐ญ ๐‚๐ฒ๐›๐ž๐ซ ๐‚๐จ๐ง๐Ÿ๐ฅ๐ข๐œ๐ญ ๐Œ๐จ๐ง๐ข๐ญ๐จ๐ซ. The goal

For the past seven days we have been closely monitoring the cyber dimension of the ongoing tensions in the Middle East.

Today we are introducing a new weekly intelligence snapshot: the ๐‡๐š๐œ๐ค๐ฆ๐š๐ง๐š๐œ ๐Œ๐ข๐๐๐ฅ๐ž ๐„๐š๐ฌ๐ญ ๐‚๐ฒ๐›๐ž๐ซ ๐‚๐จ๐ง๐Ÿ๐ฅ๐ข๐œ๐ญ ๐Œ๐จ๐ง๐ข๐ญ๐จ๐ซ.

The goal
Threat Intelligence (@threatintel) 's Twitter Profile Photo

#ThreatProtection Middle East tensions spark #backdoor and #stealer #malware, read about Symantec's protection: broadcom.com/support/securiโ€ฆ

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

๐Ÿšจ Hunt for LLM-enabled malware. From ports to API signals, stay ahead of AI threats. Full research: bit.ly/3N9n4hu #GoogleTIMondays

Cyber_OSINT (@cyber_o51nt) 's Twitter Profile Photo

Check Point Research observed increased Chinese-nexus APT activity targeting Qatar amid Middle East tensions, with Camaro Dragon attempting a PlugX variant within a day of Operation Epic Fury and leveraging the war to make lures more credible. blog.checkpoint.com/research/chinaโ€ฆ

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

Hunting LLM Malware Part 2! ๐Ÿ›ก๏ธ Explore Agentic Threats: from poisoned skills to OCR injections. Find all advanced queries in GoogleTI Saved Searches. Full analysis: bit.ly/3Na9Xg5 #GoogleTIMondays #AI #CyberSecurity ๐Ÿš€