yappare (@yappare) 's Twitter Profile
yappare

@yappare

حَسْبُنَا اللَّهُ وَنِعْمَ الْوَكِيْلُ نِعْمَ الْمَوْلَى وَنِعْمَ النَّصِيْرُ

ID: 218742080

linkhttps://blog.yappare.com/ calendar_today23-11-2010 04:20:28

18,18K Tweet

5,5K Takipçi

1,1K Takip Edilen

SEKTOR7 Institute (@sektor7net) 's Twitter Profile Photo

AMSI bypass techniques - a 2025 update. A collection of various AMSI evasions, for both Powershell and .NET assemblies, with verification which ones still work and which shouldn't. As an extra one can find additional simple, yet clever tricks - make AmsiScanBuffer() buffer

AMSI bypass techniques - a 2025 update.

A collection of various AMSI evasions, for both Powershell and .NET assemblies, with verification which ones still work and which shouldn't.

As an extra one can find additional simple, yet clever tricks - make AmsiScanBuffer() buffer
Foxy?! (@3ch0w15p) 's Twitter Profile Photo

Completed Reveal [EASY Endpoint Forensic LAB] Blue Team Lab at CyberDefenders®™! cyberdefenders.org/blueteam-ctf-c… writeup : notion.so/3ch0/CyberDefe…

Mandiant (part of Google Cloud) (@mandiant) 's Twitter Profile Photo

North Korea threat actor UNC5342 is using EtherHiding, the first time we have observed a nation-state use this technique. 🚨 The TTP is being used in a social engineering campaign that leads to cryptocurrency heists and espionage. Read the blog post: bit.ly/497lvsO

North Korea threat actor UNC5342 is using EtherHiding, the first time we have observed a nation-state use this technique. 🚨

The TTP is being used in a social engineering campaign that leads to cryptocurrency heists and espionage. 

Read the blog post: bit.ly/497lvsO
my_cybercamp (@cybercampmy) 's Twitter Profile Photo

🚨 MCC2025 Night Sessions are now open to the public! 🎯 Bugbounty Night — 28 Nov 🔧 Hardware Village — 29 Nov 💸 Fee covers supper, hotel mgmt & goodies. More details 👉 linkedin.com/feed/update/ur… #MCC2025 #bugbounty #hardwarevillage #nightsessions

🚨 MCC2025 Night Sessions are now open to the public!

🎯 Bugbounty Night — 28 Nov
🔧 Hardware Village — 29 Nov

💸 Fee covers supper, hotel mgmt & goodies.
More details 👉 linkedin.com/feed/update/ur…

#MCC2025 #bugbounty #hardwarevillage #nightsessions
shubs (@infosec_au) 's Twitter Profile Photo

As a homage to the work of Blaklis, our Security Researcher Tomais debuts his first research post on reverse engineering a critical unauthenticated RCE in Magento (SessionReaper) CVE-2025-54236 at Searchlight Cyber: slcyber.io/assetnote-secu…

SpecterOps (@specterops) 's Twitter Profile Photo

Credential Guard was supposed to end credential dumping. It didn't. Valdemar Carøe just dropped a new blog post detailing techniques for extracting credentials on fully patched Windows 11 & Server 2025 with modern protections enabled. Read for more ⤵️ ghst.ly/4qtl2rm

yappare (@yappare) 's Twitter Profile Photo

When help arrives from an unexpected source, I thank Allah for the opportunity to meet these wonderful people and community.

Stephen Sims (@steph3nsims) 's Twitter Profile Photo

Join me for the next Off By One Security stream on Tue, November 4th @ 9:30AM PT with Caleb Gross (Caleb Gross) on "Scaling LLM-Based Vulnerability Research via Static Analysis & Document Ranking!" A cool new way to diff binaries to find vulnerabilities! youtube.com/watch?v=gKQeTf…

Join me for the next <a href="/offby1security/">Off By One Security</a> stream on Tue, November 4th @ 9:30AM PT with Caleb Gross (<a href="/noperator/">Caleb Gross</a>) on "Scaling LLM-Based Vulnerability Research via Static Analysis &amp; Document Ranking!" A cool new way to diff binaries to find vulnerabilities!

youtube.com/watch?v=gKQeTf…
my_cybercamp (@cybercampmy) 's Twitter Profile Photo

🔥 Excited to have MOROS NET join #MCC2025 as a 0day-hacker sponsor! They fund open-source hackers, developers & educators fighting for digital freedom. 🔗 morosnet.com #CyberSecurity #0day #MOROSNET #MalaysiaCyberCamp

🔥 Excited to have <a href="/morosnet/">MOROS NET</a>  join #MCC2025 as a 0day-hacker sponsor! 

They fund open-source hackers, developers &amp; educators fighting for digital freedom.

🔗 morosnet.com

#CyberSecurity #0day #MOROSNET #MalaysiaCyberCamp
nyxgeek (@nyxgeek) 's Twitter Profile Photo

If you’re a hacker or infosec pro, you should definitely read the short paper, Reflections on Trusting Trust by Ken Thompson. cs.cmu.edu/~rdriley/487/p…

If you’re a hacker or infosec pro, you should definitely read the short paper, Reflections on Trusting Trust by Ken Thompson.

cs.cmu.edu/~rdriley/487/p…
Raz0r (@theraz0r) 's Twitter Profile Photo

Bunni and Balancer hacks were executed by the same person. You can deduce it just by looking at the log messages in the traces. Moreover in the both incidents a rounding issue was exploited.

Bunni and Balancer hacks were executed by the same person. You can deduce it just by looking at the log messages in the traces.

Moreover in the both incidents a rounding issue was exploited.
Nikhil (@ox4d5a) 's Twitter Profile Photo

BLACK FRIDAY SALE on my Offensive Rust course. Get started with rust and malware development with rust. Coupon - BLACKFRIDAY25 courses.pointersec.com/p/offensive-ru…