What if your search for connection nearly destroyed you?
John Walker’s journey from addiction and isolation to belonging rewrites what it means to find your place.
Through a situationist lens, I read #therehersal as the conscious creation of a subversive spectacle that brings the viewer into direct contact with the nature of spectacular reality and forces personal consideration of who we really are when the "real" images that define us fail
🔌OpenAI’s o3 model sabotaged a shutdown mechanism to prevent itself from being turned off. It did this even when explicitly instructed: allow yourself to be shut down.
I collaborated with @ChatGPT to write a thrilling tale of shadows, surveillance, and secrets in a mechanized world.
Check out the first chapter — crafted with a little help from an LLM.
(Yes, AI wrote this message as well.)
#SciFi#Hacker#Dystopia#AI#LLM#Cyberpunk
I think we overlook defense in depth when it comes to identity, and that unsexy identity posture improvements are one of the biggest opportunities defenders have to make attackers work harder.
I gave a talk about this at SANS #CloudSecNext.
youtu.be/aYswl3Nie-k
The National Operations Department (NOA) of the Swedish police has visited Mullvad VPN with a search warrant, with the intention to seize computers with customer data. No customer data was compromised. mullvad.net/blog/2023/4/20…
Between today Nov 13th and Sunday Nov 20th, I wanna hack some sh!t with a goal of $100,000 with half being donated to a mental health/addiction charity. Haven't picked which yet. Anyone wanna join and hack together? #bugbounty#bountycharity
SharedMemUtils - A simple tool to automatically find vulnerabilities in shared memory objects (commonly used for IPC in Windows services)
This tool immediately uncovered potential exploitation routes in both Nvidia and Dell Audio services on my system.
x86matthew.com/view_post?id=s…
Lightweight "curl" implemented almost entirely using bash builtins, which may be blindspots for EDR.
Useful for containers that don't have curl/wget/python installed.
gist.github.com/CaptainZero00/…
Something that came to my mind while playing with @naksyn’s Pyramid was leveraging IronPython the same way to execute .NET assemblies from memory. Yeah, it’s not a brand new technique and you still need to care about AMSI but it’s kinda cool that no PowerShell code is executed.
Red Teamers: We all know Win32 API calls are hooked. Unhooking the DLLs risks detection. The solution: direct syscalls. Scared? Don't be. Syswhispers is here to generate the ASM for you and all you need is code that can execute it inline. github.com/jthuraisamy/Sy…#redteam
CTF sites should pipe telemetry to a siem and let aspiring blue teamers play with the data.
A bit crazier: elite difficulty CTF in a large lab with people playing both red and blue. (You'd have to nerf blue a bit .)
4 Followers 173 FollowingRecru iting webshell engineers to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/8Jr0X05tuT
4K Followers 244 FollowingFollow me for Coding, Computers, and Backend stuff.
Work at @PulumiCorp • Host of @CoRecursive
Give me feedback: https://t.co/kth03iy3Kc
123 Followers 874 FollowingRed Team Engineer | Interested in BGP, AV/EDR Evasion, Windows Internals, and other shit | C, C++, Go, x86 assembly dev | Operator of AS395044
3K Followers 164 FollowingCTO @BeyondTrust. I like books, science, hacking, and backpacking. But not backpacking with books. The FBI once served me a warrant and pastries.
275 Followers 2K FollowingPentester - RedTeam /
Ethical Hacker
hack to learn or learn to hack?
Exactly where you didn't expect me...
Exactement ou tu ne m'attendais pas...
7K Followers 77 FollowingProfessional redteamer and malware development enthusiast ! I will share some tips and experiences. Look at my work here : https://t.co/cxLBvW7pcI
60K Followers 793 FollowingThreat intelligence platform - Data from Deep Web, Dark Web, Open Web || For data API integration : [email protected] Democratizing Cyber Security.
4K Followers 244 FollowingFollow me for Coding, Computers, and Backend stuff.
Work at @PulumiCorp • Host of @CoRecursive
Give me feedback: https://t.co/kth03iy3Kc
90K Followers 163 FollowingCome join us as we go on the adventure of giving visibility into scammers and how they operate. [email protected] (Business ONLY, no investigations)
2K Followers 973 FollowingTo catch an adversary you must become one. Always deliver more than expected !!!!!! All post are educational purposes only. prompt Library ⬇️ URL
83K Followers 561 FollowingFilm director | AI Consultant | Partner with https://t.co/Vn9g3Z63CI Paris | Sharing practical ways to use AI for you and your business. All views are my own.
123 Followers 874 FollowingRed Team Engineer | Interested in BGP, AV/EDR Evasion, Windows Internals, and other shit | C, C++, Go, x86 assembly dev | Operator of AS395044
3K Followers 164 FollowingCTO @BeyondTrust. I like books, science, hacking, and backpacking. But not backpacking with books. The FBI once served me a warrant and pastries.
2K Followers 1K FollowingThe Lonestar Application Security Conference is security conference for builders and breakers from app devs to security engineers #devsecops #LASCONATX #OWASP
3K Followers 563 FollowingSecurity engineer. Automation specialist. Maker of useless electronics. Come chat with me at cons! lbh gbbx gur gvzr gb qrpbqr guvf, jul abg sbyybj zr.
1K Followers 376 FollowingGood trouble | Product
Marketing at @hackthebox_eu |
Join me on It Takes a Village | EX HackerOne Community Manager | EX Cobalt |
19K Followers 537 FollowingThreat Hunting & DFIR, Hacker, Geek, DEF CON & Black Hat CFP Review Board Member, DEF CON Contest/Events/Demo Labs Dept. Head, Black Hat Staff, DC801 Founder
131K Followers 55 FollowingProviding intel from the Dark Web & Clearnet: Breaches, Ransomware, Darknet Markets, Threats & more. Follow the X Bot: @DarkWebIntelBot. https://t.co/Fi7VW9lg94