R@ffutZen (@raffutz) 's Twitter Profile
R@ffutZen

@raffutz

Security - obviously opinions are my own. Proud member of @r00tmi & @BsidesMilano #respect4responders

ID: 389690683

calendar_today12-10-2011 21:02:11

9,9K Tweet

719 Takipçi

3,3K Takip Edilen

🏴‍☠️ The Pirate 🏴‍☠️ (@pinperepette) 's Twitter Profile Photo

Oggi laboratorio. Volevo spiegare bene come funziona una vulnerabilita' web, non in teoria ma facendola vedere. Ho montato un server, l'ho bucato con un comando, e poi ho aperto tutto per capire cosa succede dentro e come si chiude il buco. Se vi interessa la sicurezza

Oggi laboratorio. Volevo spiegare bene come funziona una vulnerabilita' web, non in teoria ma facendola vedere. Ho montato un server, l'ho bucato con un comando, e poi ho aperto tutto per capire cosa succede dentro e come si chiude il buco. Se vi interessa la sicurezza
Ihtesham Ali (@ihtesham2005) 's Twitter Profile Photo

🚨 Holy shit... this Python library bypasses Cloudflare automatically and nobody's talking about it. It's called Scrapling and it just killed every scraping tool you're currently using. While everyone's duct-taping Selenium + BeautifulSoup + proxy services together and spending

🚨 Holy shit... this Python library bypasses Cloudflare automatically and nobody's talking about it.

It's called Scrapling and it just killed every scraping tool you're currently using.

While everyone's duct-taping Selenium + BeautifulSoup + proxy services together and spending
Guri (@gurinder_saroy) 's Twitter Profile Photo

🚨BREAKING: Someone just opensource'd a platform that replaces your entire DevOps monitoring stack. It's called xyOps. Job scheduling + workflow automation + server monitoring + alerting + incident response -- one self-hosted dashboard. When an alert fires, it auto-attaches

🚨BREAKING: Someone just opensource'd a platform that replaces your entire DevOps monitoring stack.

It's called xyOps.

Job scheduling + workflow automation + server monitoring + alerting + incident response -- one self-hosted dashboard.

When an alert fires, it auto-attaches
Renzon (@r3nzsec) 's Twitter Profile Photo

One of the biggest pain points for macOS-based DFIR analysts: "I have a raw Master File Table ($MFT) or USN Journal ($J), but I need a Windows VM just to parse it." Not anymore. IRFlow Timeline now imports raw $MFT and $J files directly: a two-pass binary parser extracts 22

Kali Linux (@kalilinux) 's Twitter Profile Photo

Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…

Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…
Gabbytech || Cyber_Security (@gabriel_coder01) 's Twitter Profile Photo

5 SIEM rules I actually use every day in production (and why they work) I triage 200+ alerts daily in my remote SOC role. These 5 rules have cut my false positives by ~40% and caught real threats. Thread 👇 #SOC #BlueTeam #SIEM

Mehmet Ergene (@cyb3rmonk) 's Twitter Profile Photo

This could be quite interesting and useful for #DFIR, locally on your PC. Maybe Defender timeline downloader + this? 🤔 medium.com/@gribanov.vlad…

🏴‍☠️ The Pirate 🏴‍☠️ (@pinperepette) 's Twitter Profile Photo

Ricordo quella volta che scrissi “Mac è tipo Linux”. Nei commenti qualcuno spiegò cos’è GNU/Linux a una giornalista.... e a me :) pinperepette.github.io/signal.pirate/…

International Cyber Digest (@intcyberdigest) 's Twitter Profile Photo

‼️ China's biggest cybersecurity company, Qihoo 360 (461M users), just leaked their own wildcard SSL private key inside the public installer for their new AI assistant "360 Security Claw." The private key for *.myclaw.360.cn was bundled directly in the download package under

‼️ China's biggest cybersecurity company, Qihoo 360 (461M users), just leaked their own wildcard SSL private key inside the public installer for their new AI assistant "360 Security Claw."

The private key for *.myclaw.360.cn was bundled directly in the download package under
Magnet Forensics (@magnetforensics) 's Twitter Profile Photo

What’s next for enterprise #DigitalInvestigations? Join us on March 18 for a webinar that breaks down our new State of #EnterpriseDFIR 2026 Report, including key findings and what they mean for your organization in the year ahead: ow.ly/8aBp50YuN1F #DFIR

isa yeter (@isayeter) 's Twitter Profile Photo

Just migrated our entire production stack from @DigitalOcean to Hetzner in just 24 hours — $1,432 → $233/month. Zero downtime. 30 MySQL DBs (248GB), 34 Nginx sites, GitLab EE, Neo4j. All automated with Python scripts. Full write-up on my blog 👇 isayeter.com/posts/digitalo…

Hunt.io (@huntio) 's Twitter Profile Photo

💡 Threat Hunting in Splunk with Hunt's C2 Intelligence hunt.io/glossary/splun… Threat hunting in Splunk works best when logs are enriched with reliable intelligence, and using our Splunk Addon brings live C2 infrastructure and enriched IOC feeds directly into Splunk

💡 Threat Hunting in Splunk with Hunt's C2 Intelligence

hunt.io/glossary/splun…

Threat hunting in Splunk works best when logs are enriched with reliable intelligence, and using our Splunk Addon brings live C2 infrastructure and enriched IOC feeds directly into Splunk
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

ConnectWise patches new flaw allowing ScreenConnect hijacking bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Group-IB Global (@groupib) 's Twitter Profile Photo

🚨 A new ransomware operation, #TheGentlemen, has emerged following an affiliate split revealing how #threatactors evolve from partners to independent operators while retaining advanced tooling, infrastructure, and access pipelines. Our latest analysis explores how this group is

🚨 A new ransomware operation, #TheGentlemen, has emerged following an affiliate split revealing how #threatactors evolve from partners to independent operators while retaining advanced tooling, infrastructure, and access pipelines.

Our latest analysis explores how this group is