David S 🇺🇸

7.4K posts

David S 🇺🇸 banner
David S 🇺🇸

David S 🇺🇸

@CryptoHackz

Burbank, CA 参加日 Ağustos 2014
2.7K フォロー中326 フォロワー
David S 🇺🇸 がリツイート
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
34
144
12.2K
David S 🇺🇸 がリツイート
Disclose.tv
Disclose.tv@disclosetv·
NEW - U.S. server maker Super Micro's co-founder Yih-Shyan Liaw, and two others, arrested for smuggling $2.5 billion in machines with high-end Nvidia AI chips into China — Fortune
Disclose.tv tweet media
English
44
197
999
80.6K
David S 🇺🇸 がリツイート
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Learn AI security by breaking it. Join us in Arlington at #AISummit (Apr 20–21) for 2 days of talks & workshops, including a hands-on session with Maryam Mouzarani & Aruneesh Salhotra hacking AI systems to exploit vulnerabilities — and secure them. ➡️ sans.org/u/1CNB
SANS Offensive Operations tweet media
English
0
3
6
439
David S 🇺🇸 がリツイート
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Last month Google Threat Intelligence published a report on how attackers are leveraging AI and abusing Gemini. They uncovered a malware framework named HONESTCUE. It uses the Gemini API to generate C# payloads on demand. I extracted and referenced the prompts used by this malware into PromptIntel. Check this out 👇 promptintel.novahunting.ai/feed
Thomas Roccia 🤘 tweet media
English
3
27
111
8.8K
David S 🇺🇸 がリツイート
Unit 42
Unit 42@Unit42_Intel·
Boggy Serpens, an Iranian state-sponsored threat group, now uses AI-assisted malware development and advanced evasion techniques. Our research details their evolving cyberespionage tactics. Read the full analysis to understand their techniques: bit.ly/4cNmLTZ
Unit 42 tweet media
English
2
24
67
5.8K
David S 🇺🇸 がリツイート
Chris Sanders 🔎 🧠
Chris Sanders 🔎 🧠@chrissanders88·
Investigation Scenario 🔎 Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
English
12
11
86
17.7K
David S 🇺🇸 がリツイート
Ori Nimron
Ori Nimron@orinimron123·
Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…
Ori Nimron tweet media
English
5
65
319
16.9K
David S 🇺🇸 がリツイート
0xMarioNawfal
0xMarioNawfal@RoundtableSpace·
ShadowBroker is a real-time OSINT dashboard that tracks everything on one map. - Aircraft, ships, and satellites - Earthquakes and conflict zones - CCTV networks and GPS jamming - Breaking geopolitical events All live. All open source. The world has never been this visible to anyone with a browser. github- github.com/BigBodyCobain/…
0xMarioNawfal tweet media
English
19
66
423
87.6K
David S 🇺🇸 がリツイート
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
SkyOSINT Real-time tracking of 16K+ objects on the sky. Allow to analyze anomalies, maneuvers, conjunctions and behaviorGEO. skyosint.io #geoint
Cyber Detective💙💛 tweet media
English
8
34
187
8.5K
David S 🇺🇸 がリツイート
The Hacker News
The Hacker News@TheHackersNews·
🤖 IBM X-Force found AI-generated #malware Slopoly used by Hive0163. The PowerShell backdoor persists for days, beacons every 30s, and runs commands from a remote C2. AI didn’t make it advanced — it made malware faster to build. 🔗 Read here → thehackernews.com/2026/03/hive01…
English
2
28
72
9.6K
David S 🇺🇸 がリツイート
André Baptista
André Baptista@0xacb·
A really nice Cross-Site Leak writeup.  XSS-Leak by @salvatoreabello For client-side hackers, you would love this in your arsenal because it relies on browser architecture (Chromium) rather than a specific implementation bug in a website. Since Google marked it "WAI" (Works As Intended), this vector is still open for further exploration. Blog 👇 blog.babelo.xyz/posts/cross-si…
English
1
21
144
5.9K
David S 🇺🇸 がリツイート
OSINT Industries
OSINT Industries@OSINTindustries·
🌐 The dark web is a goldmine for OSINT investigators. Leak sites, forums, and underground marketplaces are only accessible with onion browsers like Tor Browser. Learn how investigators use them 👇 osint.industries/post/osint-and…
English
0
14
70
4.1K
David S 🇺🇸 がリツイート
Mayfly
Mayfly@M4yFly·
🔥🐉 New GOAD Lab: DRACARYS I’ve just released a new free lab environment on GOAD: DRACARYS. The challenge includes 3 VMs and the objective is simple: Start with no authentication and work your way up to Domain Admin. Have fun exploiting it! 🔥🐉 mayfly277.github.io/posts/Dracarys…
English
9
98
291
16.2K
David S 🇺🇸 がリツイート
GuidedHacking
GuidedHacking@GuidedHacking·
🛠️ Game Reverse Engineering with Cheat Engine & IDA Pro The view matrix is the bridge between 3D world space and your 2D screen. This tutorial shows you how to locate it in memory and use it to build a WorldToScreen function. 👉 youtu.be/crT9zGviqVs
YouTube video
YouTube
English
0
11
83
4.9K