thaddeus e. grugq (@thegrugq) 's Twitter Profile
thaddeus e. grugq

@thegrugq

Hacker :: PhD researcher @warstudies @KingsCollegeLon :: [email protected] :: PGP keybase.io/grugq

ID: 18983429

linkhttps://gru.gq/ calendar_today14-01-2009 17:13:48

353,353K Tweet

127,127K Takipçi

415 Takip Edilen

the_storm (@the_st0rm) 's Twitter Profile Photo

Wrapped up my #BHUSA talk on Signal’s privacy guarantees and vulnerabilities ✅ Slides are now public ibrahim-elsayed.com/pdfs/US-25-ElS… Huge thanks to Signal for their support during the review, and to everyone who came to the session!

Tim Becker (@tjbecker_) 's Twitter Profile Photo

There were many moments over the past year where our LLM agents completely blew my mind! Plenty more to talk about soon, but for now, I highly recommend folks check out our public agent traces. You can watch our agents find, trigger, and patch a real exploitable 0day in sqlite!

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

As a rare and precious hypervisor VM escaper authority, this RETbleed-on-VM research from Google is cool. Few realize: most Speculative Execution & Side-Channel exploits affect hypervisors *automatically* – even if it isn't mentioned in the paper. Why? They cross software

As a rare and precious hypervisor VM escaper authority, this RETbleed-on-VM research from Google is cool.

Few realize: most Speculative Execution & Side-Channel exploits affect hypervisors *automatically* – even if it isn't mentioned in the paper.

Why?

They cross software
Matan Bahar (@bl4ckshad3) 's Twitter Profile Photo

In continuation for my recent research about UAC bypass I wrote a tool "Find-UACAutoElevate" to find executables that match the requirements to achieve UAC Bypass. github.com/ADPunisher/Fin… #PowerShell #UACBypass #AutoElevate

D4m0n (@d4m0n_8) 's Twitter Profile Photo

My first Pwn2Own 2025 Berlin vulnerability has finally been patched! Curious about how I exploited it? Keep an eye out as I’m preparing a blog post! msrc.microsoft.com/update-guide/v…

Patrick Wardle (@patrickwardle) 's Twitter Profile Photo

Just posted my DEF CON slides (talk #1): "Mastering Apple's Endpoint Security for Advanced macOS Malware Detection" Writing 🍎 security software? You should be using Endpoint Security! But its advanced features are rather nuanced & often misunderstood 🫣 speakerdeck.com/patrickwardle/…

thaddeus e. grugq (@thegrugq) 's Twitter Profile Photo

Not sure why this dataset includes companies that have been out of business for a decade or more. It makes the entire report suspect to claim hundreds of bad actor vendors, with only 59 confirmed (including cellebrite??? Really??) and then include loads of defunct companies too.

vx-underground (@vxunderground) 's Twitter Profile Photo

It's literal propaganda. First the government needed your ID and/or passport to "protect the children" from seeing bad things on the internet (they don't give a fuck about the kids). Now they want your ID to stop people from cheating in video games. It's all lies.

It's literal propaganda.

First the government needed your ID and/or passport to "protect the children" from seeing bad things on the internet (they don't give a fuck about the kids).

Now they want your ID to stop people from cheating in video games. It's all lies.
Eugenio Benincasa (@eubenincasa) 's Twitter Profile Photo

Truly elite offensive cyber talent has always been rare. This new piece for Natto dives into the small, tight-knit circles that powered China’s massive hacker communities in the late 1990s and 2000s – and went on to become industry leaders today (link in thread)

Truly elite offensive cyber talent has always been rare. This new piece for Natto dives into the small, tight-knit circles that powered China’s massive hacker communities in the late 1990s and 2000s – and went on to become industry leaders today (link in thread)
Dino A. Dai Zovi (@dinodaizovi) 's Twitter Profile Photo

This looks to be the right architecture: the MCP service is provided by the SaaS API provider themselves. The client OAuths to the MCP service, just as you would to the API behind it. You don't create more exposure to your creds than you would by calling the API directly.

Leandro Barragan (@lean0x2f) 's Twitter Profile Photo

"AI Agents for Offsec with Zero False Positives" by Brendan Dolan-Gavitt, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: cdn.prod.website-files.com/686c11d5bee015…

"AI Agents for Offsec with Zero False Positives" by <a href="/moyix/">Brendan Dolan-Gavitt</a>, a journey on how we managed to get 0 FPs with XBOW. You can find the slides for his BH talk here: cdn.prod.website-files.com/686c11d5bee015…
cts🌸 (@gf_256) 's Twitter Profile Photo

Watch out: There's a fake CL and devops199fan 🔪📜😅 ⌐◨-◨ going around spear phishing for money. They hit me up today. It's shockingly easy to fall for, the fake TG profile is very convincing. First, they created urgency by repeatedly sending calls and alarming texts

Watch out: There's a fake <a href="/CL207/">CL</a>  and <a href="/devops199fan/">devops199fan 🔪📜😅 ⌐◨-◨</a> going around spear phishing for money. They hit me up today. It's shockingly easy to fall for, the fake TG profile is very convincing.

First, they created urgency by repeatedly sending calls and alarming texts
Ray [REDACTED] (@rayredacted) 's Twitter Profile Photo

If you are a supporter of #TeamSam2028, you can watch him go for another world record tonight(!) at 22:44 eastern at the 2025 China World Games.

If you are a supporter of #TeamSam2028, you can watch him go for another world record tonight(!) at 22:44 eastern at the 2025 China World Games.
Phrack Zine (@phrack) 's Twitter Profile Photo

If you are excited about the new Phrack Zine send us an email at [email protected] sharing a memory about how phrack inspired you, a message to authors from the past or present, or something fun in line with past loopbacks! We will consider submissions for our online release!

If you are excited about the new <a href="/phrack/">Phrack Zine</a> send us an email at loopback@phrack.org sharing a memory about how phrack inspired you, a message to authors from the past or present, or something fun in line with past loopbacks! We will consider submissions for our online release!