Jacob Krell (@0x_hackerfren) 's Twitter Profile
Jacob Krell

@0x_hackerfren

Cybersec/AI expert | Hacker | Co-founder, Any-Agent AI | Pilot | Top 50 HTB | Better than a thousand hollow words is one word that brings peace | meme magic 🐸

ID: 1705261750046613506

linkhttps://0xhackerfren.gitbook.io/0x_hackerfren/ calendar_today22-09-2023 16:44:40

2,2K Tweet

1,1K Takipçi

565 Takip Edilen

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

Can we call it vibe engineering when you actually integrate software development processes like test first dev, integration checks, sprints etc There is a big difference between someone who knows how to make software using cursor. And someone who doesn't....

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

Anyone know good sources for learning ARM exploit dev. Its all going that way and I would like to be ahead of the curve instead of being stuck in 32 bit land and windows xp lol

Wil Gibbs (@cl4sm) 's Twitter Profile Photo

While playing DEF CON CTF Finals with Shellphish I managed to solve the ICO challenge using LLMs (GPT5 + Cursor) and almost no human intervention. You can read how I did it here! wilgibbs.com/blog/defcon-fi…

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

The world isnt ready for the polymorphism of worms running as AI agents. That sure is a nice claude cli you have on your computer there.

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

With the OSC3E done, that is a multi year goal out of the way, and the highest mountain i could find climbed. I am feeling kind of lost. I guess it's now time to transition into competing as a primary goal. Does anyone know a good ctf team with a spot open? Maybe other

With the OSC3E done, that is a multi year goal out of the way, and the highest mountain i could find climbed. 

I am feeling kind of lost. 

I guess it's now time to transition into competing as a primary goal. 
Does anyone know a good ctf team with a spot open? 

Maybe other
Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

Today I learned about the Pyramid of Pain. It shows the effort attackers face when defenders block different IOCs. Hashes are easy to change, but blocking a tool or tactic causes real disruption. Most importantly, it has a cool name!

Today I learned about the Pyramid of Pain.

 It shows the effort attackers face when defenders block different IOCs. 

Hashes are easy to change, but blocking a tool or tactic causes real disruption.

Most importantly, it has a cool name!
Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

Good morning everyone, half way thru the week! Reminder that social media can be very toxic. Compare yourself to who you were yesterday, not who someone else is today.

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

The more I learn about Android, the more I am thankful for how much effort has gone into the secure by design nature of the platform.....

The more I learn about Android, the more I am thankful for how much effort has gone into the secure by design nature of the platform.....
spencer (@techspence) 's Twitter Profile Photo

New free tool released this week to help admins get control of their applocker policies. If you’ve tried it let me know!

Jacob Krell (@0x_hackerfren) 's Twitter Profile Photo

Today I learned about AI DoS “Sponge” attacks. By crafting special inputs, you can maximize the amount of computations required and increase output token length. This is commonly done by manipulating the tokenization process. As an Example: Normal query: Hello world → 2 tokens