Tuan Trieu (@tuantrieu12) 's Twitter Profile
Tuan Trieu

@tuantrieu12

Just geek

ID: 1166478770976374784

calendar_today27-08-2019 22:33:21

711 Tweet

27 Followers

1,1K Following

Gen Threat Labs (@genthreatlabs) 's Twitter Profile Photo

Malware signed by stolen certificates is using #Follina vulnerability to spread evil #AsyncRAT into the #Palau paradise. Seems targeted. Read more on #AvastDecoded decoded.avast.io/threatintel/ouโ€ฆ

Muqsit ๐• (@mqst_) 's Twitter Profile Photo

If you're a Beginner in Secure Code Review, watch this video. It gives you a basic idea of how to find XXE vulnerabilities during Secure Code Reviews. Video: youtube.com/watch?v=HKDe1zโ€ฆ

If you're a Beginner in Secure Code Review, watch this video.

 It gives you a basic idea of how to find XXE vulnerabilities during Secure Code Reviews.

Video: youtube.com/watch?v=HKDe1zโ€ฆ
Jason Haddix (@jhaddix) 's Twitter Profile Photo

This is a fantastic read about how the world is changing and how @[email protected] would approach his career starting over in the now. I agree with 100% of his advice. securing.dev/posts/if-i-werโ€ฆ

spaceraccoon | Eugene Lim (@spaceraccoonsec) 's Twitter Profile Photo

A lot of people think every bug is a vulnerability. Itโ€™s not. In Chapter 0 of my book From Day Zero to Zero Day, I break down exactly what makes a bug a real vulnerability and why it matters. ๐Ÿชฒ A bug is an error in logic or behavior. Whereas, a vulnerability must: ๐Ÿ’ฅ Be

A lot of people think every bug is a vulnerability.

Itโ€™s not.

In Chapter 0 of my book From Day Zero to Zero Day, I break down exactly what makes a bug a real vulnerability and why it matters.

๐Ÿชฒ A bug is an error in logic or behavior.

Whereas, a vulnerability must:
๐Ÿ’ฅ Be
Katie Knowles (@_sigil) 's Twitter Profile Photo

๐Ÿ•ต๏ธโ€โ™€๏ธ I'll be presenting "I SPy: Rethinking Entra ID research for new paths to Global Adminโ€ at fwd:cloudsec June 30-July 1, alongside some fantastic other speakers: fwdcloudsec.org/conference/norโ€ฆ If you canโ€™t make it, talks are streamed at: youtube.com/@fwdcloudsec

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Entra ID monitoring - are you doing the basics? (Part 2)'' #infosec #pentest #redteam #blueteam securediam.com/f/entra-id-monโ€ฆ

Pethuraj M (@pethuraj) 's Twitter Profile Photo

๐Ÿง ๐Ÿ” ๐—ฉ๐—ฃ๐—ž - ๐—”๐—œ-๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด A web-based platform that leverages Vast.ai GPU instances for authorized password cracking using Hashcat. ๐Ÿ”— github.com/d-sec-net/VPK #CyberSecurity #RedTeam #Pentest

๐Ÿง ๐Ÿ” ๐—ฉ๐—ฃ๐—ž - ๐—”๐—œ-๐—ฃ๐—ผ๐˜„๐—ฒ๐—ฟ๐—ฒ๐—ฑ ๐—ฃ๐—ฎ๐˜€๐˜€๐˜„๐—ผ๐—ฟ๐—ฑ ๐—–๐—ฟ๐—ฎ๐—ฐ๐—ธ๐—ถ๐—ป๐—ด
A web-based platform that leverages Vast.ai GPU instances for authorized password cracking using Hashcat.

๐Ÿ”— github.com/d-sec-net/VPK

#CyberSecurity #RedTeam #Pentest
trish (@_trish_xd) 's Twitter Profile Photo

From Zero to main(): How to Write a Bootloader from Scratch Just found this awesome guide on how bootloaders work and how to build one from scratch. covering memory maps, linker scripts, startup code, and more. interrupt.memfault.com/blog/how-to-wrโ€ฆ

From Zero to main(): How to Write a Bootloader from Scratch

Just found this awesome guide on how bootloaders work and how to build one from scratch. covering memory maps, linker scripts, startup code, and more.

interrupt.memfault.com/blog/how-to-wrโ€ฆ
SpecterOps (@specterops) 's Twitter Profile Photo

Introducing the BloodHound Query Library! ๐Ÿ“š Martin Sohn & Joey Dreijer explore the new collection of Cypher queries designed to help BloodHound users to unlock the full potential of the BloodHound platform by creating an open query ecosystem. ghst.ly/4jTgRQQ

DirectoryRanger (@directoryranger) 's Twitter Profile Photo

DLL injection fundamental Part 1 systemweakness.com/dll-injection-โ€ฆ Part 2 systemweakness.com/dll-injection-โ€ฆ Part 3 systemweakness.com/dll-injection-โ€ฆ

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''No Agent, No Problem: Discovering Remote EDR'' #infosec #pentest #redteam #blueteam jonny-johnson.medium.com/no-agent-no-prโ€ฆ

SemiAnalysis (@semianalysis_) 's Twitter Profile Photo

AI at scale keeps reinventing and rediscovering classic systems & HPC tricks. Not because itโ€™s unoriginal but because the bottlenecks: memory, I/O, and networking, are the same. Techniques like KV cache, speculative decoding, and paged attentions were all inspired by or resemble

AI at scale keeps reinventing and rediscovering classic systems & HPC tricks. Not because itโ€™s unoriginal but because the bottlenecks: memory, I/O, and networking, are the same. Techniques like KV cache, speculative decoding, and paged attentions were all inspired by or resemble