David S ๐Ÿ‡บ๐Ÿ‡ธ

7.4K posts

David S ๐Ÿ‡บ๐Ÿ‡ธ banner
David S ๐Ÿ‡บ๐Ÿ‡ธ

David S ๐Ÿ‡บ๐Ÿ‡ธ

@CryptoHackz

Burbank, CA ๊ฐ€์ž…์ผ AฤŸustos 2014
2.7K ํŒ”๋กœ์ž‰326 ํŒ”๋กœ์›Œ
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
mthcht
mthcht@mthcht2ยท
๐Ÿ‘๏ธ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.giโ€ฆ
English
0
35
153
13K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Disclose.tv
Disclose.tv@disclosetvยท
NEW - U.S. server maker Super Micro's co-founder Yih-Shyan Liaw, and two others, arrested for smuggling $2.5 billion in machines with high-end Nvidia AI chips into China โ€” Fortune
Disclose.tv tweet media
English
46
204
1K
82.1K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
SANS Offensive Operations
SANS Offensive Operations@SANSOffensiveยท
Learn AI security by breaking it. Join us in Arlington at #AISummit (Apr 20โ€“21) for 2 days of talks & workshops, including a hands-on session with Maryam Mouzarani & Aruneesh Salhotra hacking AI systems to exploit vulnerabilities โ€” and secure them. โžก๏ธ sans.org/u/1CNB
SANS Offensive Operations tweet media
English
0
3
6
457
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Thomas Roccia ๐Ÿค˜
Thomas Roccia ๐Ÿค˜@fr0gger_ยท
๐Ÿค“ Last month Google Threat Intelligence published a report on how attackers are leveraging AI and abusing Gemini. They uncovered a malware framework named HONESTCUE. It uses the Gemini API to generate C# payloads on demand. I extracted and referenced the prompts used by this malware into PromptIntel. Check this out ๐Ÿ‘‡ promptintel.novahunting.ai/feed
Thomas Roccia ๐Ÿค˜ tweet media
English
3
27
111
8.8K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Unit 42
Unit 42@Unit42_Intelยท
Boggy Serpens, an Iranian state-sponsored threat group, now uses AI-assisted malware development and advanced evasion techniques. Our research details their evolving cyberespionage tactics. Read the full analysis to understand their techniques: bit.ly/4cNmLTZ
Unit 42 tweet media
English
2
24
66
5.8K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Chris Sanders ๐Ÿ”Ž ๐Ÿง 
Chris Sanders ๐Ÿ”Ž ๐Ÿง @chrissanders88ยท
Investigation Scenario ๐Ÿ”Ž Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
English
12
11
86
17.7K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Ori Nimron
Ori Nimron@orinimron123ยท
Just released DriverExplorer โ€” a Rust utility for exploring Windows kernel drivers. โ€ข Enumerate loaded drivers โ€ข Easily Load / Unload drivers โ€ข Built for Windows kernel devs & security researchers: github.com/orinimron123/Dโ€ฆ
Ori Nimron tweet media
English
5
65
319
16.9K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
0xMarioNawfal
0xMarioNawfal@RoundtableSpaceยท
ShadowBroker is a real-time OSINT dashboard that tracks everything on one map. - Aircraft, ships, and satellites - Earthquakes and conflict zones - CCTV networks and GPS jamming - Breaking geopolitical events All live. All open source. The world has never been this visible to anyone with a browser. github- github.com/BigBodyCobain/โ€ฆ
0xMarioNawfal tweet media
English
19
66
423
87.6K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Cyber Detective๐Ÿ’™๐Ÿ’›
Cyber Detective๐Ÿ’™๐Ÿ’›@cyb_detectiveยท
SkyOSINT Real-time tracking of 16K+ objects on the sky. Allow to analyze anomalies, maneuvers, conjunctions and behaviorGEO. skyosint.io #geoint
Cyber Detective๐Ÿ’™๐Ÿ’› tweet media
English
8
34
187
8.5K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
The Hacker News
The Hacker News@TheHackersNewsยท
๐Ÿค– IBM X-Force found AI-generated #malware Slopoly used by Hive0163. The PowerShell backdoor persists for days, beacons every 30s, and runs commands from a remote C2. AI didnโ€™t make it advanced โ€” it made malware faster to build. ๐Ÿ”— Read here โ†’ thehackernews.com/2026/03/hive01โ€ฆ
English
2
28
72
9.6K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Andrรฉ Baptista
Andrรฉ Baptista@0xacbยท
A really nice Cross-Site Leak writeup.ย  XSS-Leak by @salvatoreabello For client-side hackers, you would love this in your arsenal because it relies on browser architecture (Chromium) rather than a specific implementation bug in a website. Since Google marked it "WAI" (Works As Intended), this vector is still open for further exploration. Blog ๐Ÿ‘‡ blog.babelo.xyz/posts/cross-siโ€ฆ
English
1
21
144
5.9K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Raunak Yadush
Raunak Yadush@raunak_yadushยท
๐Ÿšจ ALL FREE CERTIFICATION RESOURCES ๐Ÿšจ ๐Ÿ“˜ AWS ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ ๐Ÿ” CISSP ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ ๐Ÿ›ก๏ธ CISA ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ ๐Ÿ“Š CISM ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ โš ๏ธ CRISC ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ ๐Ÿ“ˆ Digital Marketing ๐Ÿ‘‰ drive.google.com/drive/mobile/fโ€ฆ ๐Ÿ” Retweet to help others
English
19
646
1.8K
147.4K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
OSINT Industries
OSINT Industries@OSINTindustriesยท
๐ŸŒ The dark web is a goldmine for OSINT investigators. Leak sites, forums, and underground marketplaces are only accessible with onion browsers like Tor Browser. Learn how investigators use them ๐Ÿ‘‡ osint.industries/post/osint-andโ€ฆ
English
0
14
70
4.1K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
Mayfly
Mayfly@M4yFlyยท
๐Ÿ”ฅ๐Ÿ‰ New GOAD Lab: DRACARYS Iโ€™ve just released a new free lab environment on GOAD: DRACARYS. The challenge includes 3 VMs and the objective is simple: Start with no authentication and work your way up to Domain Admin. Have fun exploiting it! ๐Ÿ”ฅ๐Ÿ‰ mayfly277.github.io/posts/Dracarysโ€ฆ
English
9
98
291
16.2K
David S ๐Ÿ‡บ๐Ÿ‡ธ ๋ฆฌํŠธ์œ—ํ•จ
GuidedHacking
GuidedHacking@GuidedHackingยท
๐Ÿ› ๏ธ Game Reverse Engineering with Cheat Engine & IDA Pro The view matrix is the bridge between 3D world space and your 2D screen. This tutorial shows you how to locate it in memory and use it to build a WorldToScreen function. ๐Ÿ‘‰ youtu.be/crT9zGviqVs
YouTube video
YouTube
English
0
11
83
4.9K