sn0b4ll (@sn0b4ll) 's Twitter Profile
sn0b4ll

@sn0b4ll

Working on the Blue side of IT-Security.
Interested in Malware, Exploit-Writing, Forensics and CTFs. Private account, all opinions are my own. He/Him.

ID: 2425211805

linkhttps://github.com/sn0b4ll calendar_today20-03-2014 18:22:34

1,1K Tweet

133 Followers

444 Following

Eric Capuano - Bsky: @eric.zip (@eric_capuano) 's Twitter Profile Photo

This is legit. Might be the easiest DFIR automation workflow tool I've seen yet. Took ~2 minutes to setup with docker compose, and only seconds to generate some Hayabusa outputs. I feel like I am only scratching the surface of what's possible, can't wait to dig in deeper🔥

This is legit. Might be the easiest DFIR automation workflow tool I've seen yet. Took ~2 minutes to setup with docker compose, and only seconds to generate some Hayabusa outputs. 

I feel like I am only scratching the surface of what's possible, can't wait to dig in deeper🔥
vx-underground (@vxunderground) 's Twitter Profile Photo

The cycle of the malware researcher: > randomly appears on social media > showcases their research > publishes a few high quality articles > gets offered job > disappears > no more public research We've seen this probably 50 times now, no exaggeration.

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

C# program finds Windows Defender folder exclusions using Windows Defender through its command-line tool (MpCmdRun.exe) github.com/Friends-Securi…

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be

What people often overlook in #DetectionEngineering is that there’s no "one-size-fits-all" rule to detect a threat. It depends on your goals. 

How specific should the rule be? Are you tracking a threat actor, detecting the tool/malware, or focusing on the technique? Should it be
Baptiste Robert (@fs0c131y) 's Twitter Profile Photo

Today, the famous hacker known as USDoD was arrested by the Brazilian police. The FBI had a way to find his identity and home address since at least June 2022. I will show you how. It's OSINT time! ⬇️

vxdb (@vxdb) 's Twitter Profile Photo

A very powerful exploit has been publicly disclosed today pertaining 'BattlEye', following the Call of Duty: Warzone issue. The popular Anti-Cheat solution BattlEye was found to have a severe exploit where you are able to ban any player from any game that uses BattlEye.

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

„installing Wazuh agents on victims‘ devices“ … I love it 🖤 because the question is: why use a C2 and risk detection when legitimate tools offer 90% of the functionality and usually fly under the radar of AVs/EDRs?

Andrew Case (@attrc) 's Twitter Profile Photo

Our talk from DEF CON is now available! In the presented research, we document every EDR bypass technique used in the wild along with how to detect it using new memory forensics techniques and volatility plugins. Feedback appreciated! youtube.com/watch?v=PmqvBe… #DFIR

Troy Hunt (@troyhunt) 's Twitter Profile Photo

Data breach at The Club Penguin Experience. Let me take a moment to point out what an awesome job these folks have done with their disclosure: 1. They sent this out the same week as the breach occurred 2. They say exactly what happened and what was exposed 3. They say “hash” and

Data breach at The Club Penguin Experience. Let me take a moment to point out what an awesome job these folks have done with their disclosure:

1. They sent this out the same week as the breach occurred
2. They say exactly what happened and what was exposed
3. They say “hash” and
SinSinology (@sinsinology) 's Twitter Profile Photo

🔥💀After 40 hours of constant reversing of weird looking c++ and no sleep, I Finally cooked the CVE-2024-47575 fortimanager unauthenticated RCE 🩸

HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨🚨🚨Cyberattack Alert ‼️ 🇪🇺European External Action Service (EEAS) Hunters International ransomware group claims to have breached the European External Action Service (EEAS), the diplomatic service in charge of executing all international relations of the European Union.

🚨🚨🚨Cyberattack Alert ‼️

🇪🇺European External Action Service (EEAS)

Hunters International ransomware group claims to have breached the European External Action Service (EEAS), the diplomatic service in charge of executing all international relations of the European Union.
Bert-Jan 🛡️ (@bertjancyber) 's Twitter Profile Photo

For all #KQL fans, I had this list of community repos lying around, the list now consists of 33 repos for you to investigate. Happy hunting! 🏹 Feel free to send a PR if you miss repos! :) github.com/Bert-JanP/Hunt…

For all #KQL fans, I had this list of community repos lying around, the list now consists of 33 repos for you to investigate. Happy hunting! 🏹

Feel free to send a PR if you miss repos! :)
github.com/Bert-JanP/Hunt…
nyxgeek (@nyxgeek) 's Twitter Profile Photo

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems. On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.

Did you know that 7z can browse .VHD and .VMDK files? You can open them right up, and even directly browse ntfs filesystems.

On a pentest and find a bunch of disk images? Copy the SAM/SECURITY/SYSTEM hives directly from the images, no mounting, copying, or fussing around.
Hudson Rock (@rockhudsonrock) 's Twitter Profile Photo

🚨🚨 Massive MOVEit Vulnerability Breach: 🚨🚨 Hacker Leaks Employee Data from Amazon, McDonald’s, HSBC, HP, and Potentially 1000+ Other Companies infostealers.com/article/massiv…

radare (@radareorg) 's Twitter Profile Photo

All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! 👉 radare.org/con/2024/

All the workshop recordings and slides from #r2con2024 are now edited and published. If you didn't had a chance to attend now it's a good time to catch up starting right from the very first day! 👉 radare.org/con/2024/