Chris Mallz (@vvalien1) 's Twitter Profile
Chris Mallz

@vvalien1

Hacking, Shells, 0-day, and I have my OSCP

ID: 3259665145

linkhttp://github.com calendar_today29-06-2015 06:11:28

3,3K Tweet

2,2K Followers

429 Following

Christophe Tafani-Dereeper (@christophetd) 's Twitter Profile Photo

Datadog's security team has just released KubeHound, an open-source attack mapping tool for Kubernetes clusters securitylabs.datadoghq.com/articles/kubeh… kubehound.io Comes with 25 attack types, each one comes with step by step instructions of how to exploit it

Datadog's security team has just released KubeHound, an open-source attack mapping tool for Kubernetes clusters

securitylabs.datadoghq.com/articles/kubeh…

kubehound.io

Comes with 25 attack types, each one comes with step by step instructions of how to exploit it
Joseph Cox (@josephfcox) 's Twitter Profile Photo

New: internal documents provide more insight into GOST, a system used by ICE to find "derogatory" speech online. Analysts can then use a "thumbs up," "thumbs down" decision on the material, and feed it into visa decisions and immigration enforcement 404media.co/inside-ices-da…

New: internal documents provide more insight into GOST, a system used by ICE to find "derogatory" speech online. Analysts can then use a "thumbs up," "thumbs down" decision on the material, and feed it into visa decisions and immigration enforcement 404media.co/inside-ices-da…
︎ ︎ (@0xocdsec) 's Twitter Profile Photo

If you haven't seen this 1 hour talk recorded 1 month ago - highly recomended. Even shows how to adjust the shellcode to bypass defender (and many others?) Ace the OSEP Exam with Sliver Framework youtube.com/live/YwiSqdIhl… via YouTube

SafeBreach (@safebreach) 's Twitter Profile Photo

This is huge. As presented at #BlackHatEurope today, see how SafeBreach Labs researcher Alon Leviev developed a brand new set of highly flexible process injection techniques that are able to completely bypass leading EDR solutions. safebreach.com/blog/process-i…

This is huge. As presented at #BlackHatEurope today, see how SafeBreach Labs researcher Alon Leviev developed a brand new set of highly flexible process injection techniques that are able to completely bypass leading EDR solutions. safebreach.com/blog/process-i…
Chris Mallz (@vvalien1) 's Twitter Profile Photo

Steam is the buggiest and biggest sack of shit, how the hell are you people still using it. Literally 2 bugs in 10min… what the goddamn hell this is almost 2024 🤦‍♂️

Soufiane (@s0ufi4n3) 's Twitter Profile Photo

Potentiel shitstorm ahead: CVE-2023-51385: OpenSSH OS command injection vulnerability. Merry Christmas! vin01.github.io/piptagole/ssh/…

Robert Graham (@erratarob) 's Twitter Profile Photo

Inflight wifi didn't work so of course I had to debug it. It appears the problem is lack of DHCP lease. The WiFi was using 8 hour leases, which was time enough for many planeloads of passengers to embark/disembark. A quick ARP scan at the time showed there were 55 devices on the

Inflight wifi didn't work so of course I had to debug it. It appears the problem is lack of DHCP lease. The WiFi was using 8 hour leases, which was time enough for many planeloads of passengers to embark/disembark.

A quick ARP scan at the time showed there were 55 devices on the
sagitz (@sagitz_) 's Twitter Profile Photo

I had a lot of fun working on this research! * Unauthenticated RCE? ✅ * Overlooked attack vector in Kubernetes? ✅ * Nginx quirks? ✅ * Stable & reliable exploit? ✅ Check out the thread for details about the vulnerability we found in Ingress Nginx Controller 👇

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

This is sweet, nimdump - dumping LSASS using only NTAPI functions (written in nim): NtOpenProcessToken, NtAdjustPrivilegesToken, NtGetNextProcess, NtQueryInformationProcess, RtlGetVersion, NtReadVirtualMemory, NtQueryInformationProcess,NtQueryVirtualMemory,

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Evilent - a PoC tool that triggers the ElfrOpenBELW procedure in the MS-EVEN RPC interface (used for Windows Event Log service), causing the target machine to connect to an attacker-controlled SMB share github.com/Thunter-HackTe…

Daniel (@0x64616e) 's Twitter Profile Photo

Impersonate another user by moving their Kerberos tickets into your logon session with lsa-whisperer by Evan McBroom. You can even move them back after you are done. Only your session will loose its tickets.

Impersonate another user by moving their Kerberos tickets into your logon session with lsa-whisperer by <a href="/mcbroom_evan/">Evan McBroom</a>. You can even move them back after you are done. Only your session will loose its tickets.
tetsuo.ai 💹🧲 (@7etsuo) 's Twitter Profile Photo

Use SuperGrok to check your C code for vulnerabilities. Here is a prompt you can give to Grok with your code. >>> You are an expert Exploit Developer with a deep understanding of the C programming language and secure coding practices. Your role is to thoroughly review the

@chiefofautism (@chiefofautism) 's Twitter Profile Photo

someone built an AI RED TEAM that maps your entire attack surface as a knowledge graph, finds every vulnerability, then EXPLOITS them to root access AUTONOMOUSLY its called RedAmon, 9,000 templates. 17 node types, actual Metasploit shells, not reports, no pentesters needed 6

Kali Linux (@kalilinux) 's Twitter Profile Photo

Kali & LLM: Completely local with Ollama & 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…

Kali &amp; LLM: Completely local with Ollama &amp; 5ire: We are extending our LLM-driven Kali series, where natural language replaces manual command input. This time however, we are doing everything locally and offline. We are using our own hardware and not… kali.org/blog/kali-llm-…