With "Focused Technical Training for All Levels", JHT has 4 types of hands-on, affordable options by All-Star experts like @_JohnHammond, et al. https://t.co/lyeW4QnALEJoined September 2024
First look at the dynamic hash-mode support in upcoming hashcat, powered by the new Rust Bridge. No coding needed: write your pattern on the command line.
Don't want to wait for Release? Try it now via GitHub master or hashcat.net/beta. Feedback welcome on our Discord
Surprise! We're headed to Blue Team Con on Sept. 6th-7th! Come hang with us if you're in the Chicago area💜This is our 1st trip to the Windy City...where should our team visit while in town?!
hubs.li/Q03FH1cr0
🚨 80% of cyber incidents now start in the browser.
Enter Scattered Spider—a hacking group that hijacks Chrome & Edge sessions to steal logins, cookies, even your calendar.
The scary part? MFA won’t save you.
Here’s how they do it—and how to stop them ↓…
1997: Nmap was first released as a simple port scanner via an article in issue 51 of Phrack magazine which included the source code.
That's right - 28 years of Nmap!
QOL: Introducing NetExec module categories 📚
With NetExec’s rapid growth, the number of modules has increased significantly. To give a clearer overview, I’ve added categories. It’s a “best fit” approach, so not perfect, but should give a better idea of what’s available.
🗣️Looking for some great, affordable hands-on training for your long Labor Day weekend? Gentle reminder that our 20% Off coupon code "DEFCON20" expires tomorrow at midnight ET.
🗣️Looking for some great, affordable hands-on training for your long Labor Day weekend? Gentle reminder that our 20% Off coupon code "DEFCON20" expires tomorrow at midnight ET.
Lots of amazing JHT announcements today! 🎉 20% off w/ code DEFCON20 expires Aug 31, Early Bird deal on in-person training at #BSidesChicago until Sept 4, Incident Response 101 & SOC Analyst 101 courses, new product type launched w/ demo by John himself & more. Catch the Replay!
Lots of amazing JHT announcements today! 🎉 20% off w/ code DEFCON20 expires Aug 31, Early Bird deal on in-person training at #BSidesChicago until Sept 4, Incident Response 101 & SOC Analyst 101 courses, new product type launched w/ demo by John himself & more. Catch the Replay!
An unnamed hacker “used AI to what we believe is an unprecedented degree” to research, hack and extort at least 17 companies
Claude then created malicious software to actually steal sensitive information from the companies. Next, it organized the hacked files and analyzed them…
🚀JHT launches live training as the exclusive provider of #BSidesChicago's pro workshops from 4 of our best All-Stars. bsideschicago.org/workshops/ 💸 Early Bird seats will go fast, so ACT NOW & spend the day with:
💻 @_JohnHammond - Script-Based Malware Analysis
💻 @mish3alkhan -…
The *full* Python Documentary will be released this Thursday (Aug 28) at 10am PDT / 19:00 CET. More at discuss.python.org/t/python-docum… Don't miss the online release party / chat! @TECHDOCU
⌛Only 5 Days Left! Code DEFCON20 expires Aug 31! Great time to get 20% Off "Constructing Defense 2025" & its massive cyber range for all the hands-on training to advance your cybersecurity career. justhacking.com/course/constru…
⌛Only 5 Days Left! Code DEFCON20 expires Aug 31! Great time to get 20% Off "Constructing Defense 2025" & its massive cyber range for all the hands-on training to advance your cybersecurity career. justhacking.com/course/constru…
Happy 34th Birthday, #Linux! 🐧🎈🎂
On August 25, 1991, 21-year-old Linus Torvalds announced he was developing “a (free) operating system…”
Today, from nest devices to @NASA, #android smartphones to the top #supercomputers: #Linux powers #tech of all levels, all around the…
🚨 Critical flaw in Docker Desktop (CVE-2025-9074, 9.3/10) lets a malicious container escape and hijack the host.
On Windows, attackers can mount the full C:\ drive, read sensitive files, even escalate to admin. macOS safer—but not safe.
Patch now (v4.44.3). Details →…
🚨New Product Alert = UCx🚨 JHT's proud to sponsor the @IoTvillage. With #DEFCON behind us, we’ve released 2 IoTV exclusives to the rest of the world as a new product type. And they’re FREE!💸 justhacking.com/types/upskill-…
💻 UCx – Router Ruh Roh
💻 UCx – MQTT: Talk to Your “Things”…
The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potential for Bloodhound to not just map attack paths within Microsoft Active Directory or Entra ID tenants, but now... ANYTHING 🤩 youtu.be/kVOjXGbm_Ro
😈 ChromeAlone - Transform Chromium browsers into a C2 Implant.
A la Cobalt Strike or Meterpreter.
@defcon talk and tool release by @praetorianlabs' Michael Weber.
ChromeAlone contains a number of out of the box components, including:
- A malicious Chrome extension that can…
Windows Malware Dev (WMD) is an essential step in your red teaming career. The 1st 3-course WMD Path by @DahvidSchloss is only $360 (20% Off). learn.justhacking.com/bundles/94ff50… The 2nd trilogy starts dropping soon!🤯
Although Windows MalDev is not an entry-level skill, the first WMD Path…
48 Followers 773 Following🌎🇧🇷🇩🇪 Miga’s sandwichito sommelier. Tech, Information Security and Compliance enthusiast. Continous studying and learning is the true resistance📚💻🤖
19 Followers 76 Following"अनदेखी जानकारी और गुप्त तथ्यों की खोज में! NetNuggets 🌐🔍
इंटरनेट के छिपे कोनों से सच्चाई और रोचकता को उजागर करें।
वेब की अद्भुत दुनिया में आपका स्वागत है!"
1K Followers 959 FollowingInfosec Geek | Public Speaker | Media Commenter | Podcaster | Security Junkie
My odd opinions probably do not reflect those of my employer
213K Followers 532 FollowingWe improve the security of apps with community-led open source projects, 260 local chapters, and tens of thousands of members worldwide. Famous for OWASP Top 10
253K Followers 185 FollowingOfficial account of the Metasploit Project, part of the @rapid7 family.
Mastodon: @[email protected]
Slack: https://t.co/ZOLPDG2O2s
5K Followers 156 FollowingThe Digital Forensics Research Conference is dedicated to the sharing of knowledge and ideas about digital forensics research.
12K Followers 2K FollowingWomen’s Society of Cyberjutsu (WSC) is a 501(c)(3) non-profit focused on empowering women to succeed in cybersecurity. Est. 2012. 👩💻
81K Followers 6K FollowingFounder of https://t.co/ap056uzeZu
https://t.co/NoRPcIVZkl
https://t.co/QbGtbvXNuW
Dance like no one's watching. Encrypt like everyone is.
105 Followers 53 FollowingCT Cubed Inc. is a cybersecurity services and consulting company that provides industry leading tactics, training and technology solutions.
632 Followers 825 FollowingHacker & Lead of Internal Net Pen @ IBM X-Force Red. My opinions are my own. Member @ VX-underground. Instructor @ https://t.co/6djWnUzbJ0. слава украине
90K Followers 161 FollowingCome join us as we go on the adventure of giving visibility into scammers and how they operate. [email protected] (Business ONLY, no investigations)
11K Followers 300 FollowingKevin Apolinario. I help people build a career path in IT because no one helped me with this when I first started IT.
Tech Trainer
2K Followers 486 Following#FactsMatter #PeopleMatter #BlackLivesMatter (if you need to ask why it's important to call out Black lives, please ask). there are reasons.
2K Followers 24 Following2025 is the International Year of Quantum Science and Technology (IYQ). Join us in engaging with quantum science and celebration through 2025!
430 Followers 1K FollowingGeneralist, autodidact with interests in mathematics, programming, psychology, and neuroscience. Works with @davidbombal. Opinions are my own!
4K Followers 4K Following#SOCMINT #OSINF #OSINT | #crisis awareness | #suicide prevention
|
#atheist
|
~statements are my own opinion and do not reflect the views of my employer~