Brute Bee

4.4K posts

Brute Bee banner
Brute Bee

Brute Bee

@BruteBee

🛡️ #EthicalHacker & #InfoSec Pro | Lover of Digital Forensics 🔍 | Purple Teamer 🚀 | Let's secure the web!

Katılım Temmuz 2019
479 Takip Edilen3.6K Takipçiler
Brute Bee
Brute Bee@BruteBee·
Think you can break in? Target: 72.62.139.247 Service: SSH exposed (as everyone warns against 👀) Your mission: - Gain access - Escalate privileges Rules: - Keep it technical - Proof on DM Let’s see who actually knows what they’re doing. #tryhackme #hackme
Brute Bee tweet media
English
0
0
1
105
Brute Bee retweetledi
Matthew Toussain
Matthew Toussain@0sm0s1z·
We're here folks. Just some final polish. I desperately need help testing in alternative contexts, but... Ya'll I think we finally have a true general-purpose open-source vulnerability scanner. Network scans. Agent scans. Template and script scans. It's all there. Free.
Sirius Scan@Sirius_Scan

To be clear... v1 is available now, but not yet official. That said... It's sooooo good!!! Check it out with some caveats today, but look for the vision of future open source vulnerability identification.

English
5
7
86
13.1K
Brute Bee
Brute Bee@BruteBee·
"There are guardrails in our product that are not powered by AI" - Doctronic Co-founders Dr. Adam Oskowitz and Matt Pavelle are about to make one of of the biggest mistakes of their lives. Somebody called an AI prompt injection engineer? youtu.be/ZOX6ubU_Wq4?si…
YouTube video
YouTube
English
2
0
0
289
Brute Bee
Brute Bee@BruteBee·
Isn't that funny? That is common knowledge and yet Microsoft continues to load secrets onto the memory.. so as everyone! BITWARDEN... don't even get me started. That is a well known thing, great article, buddy
Horizon Secured@horizon_secured

🔒 Secure Bits 💡 𝗗𝗼 𝘆𝗼𝘂 𝘂𝘀𝗲 𝗥𝗗𝗣? There’s a 𝘀𝘂𝗿𝗽𝗿𝗶𝘀𝗶𝗻𝗴 𝗿𝗶𝘀𝗸 you might not be thinking about — and it’s already on your machine. When you use Remote Desktop (𝗥𝗗𝗣) via the 𝗠𝗦𝗧𝗦𝗖 client, any credentials you enter can be retrieved in plaintext in the process 𝗺𝗲𝗺𝗼𝗿𝘆. That means your domain admin password could be sitting there, waiting to be pulled — no keylogger needed. 📌 You can’t just flip a setting to 𝗱𝗶𝘀𝗮𝗯𝗹𝗲 this. But there are some 𝘄𝗮𝘆𝘀 𝘁𝗼 𝗿𝗲𝗱𝘂𝗰𝗲 𝘁𝗵𝗲 𝗿𝗶𝘀𝗸: 1️⃣ 𝗨𝘀𝗲 𝗮 𝗣𝗿𝗶𝘃𝗶𝗹𝗲𝗴𝗲𝗱 𝗔𝗰𝗰𝗲𝘀𝘀 𝗪𝗼𝗿𝗸𝘀𝘁𝗮𝘁𝗶𝗼𝗻 (𝗣𝗔𝗪) — ideally a physical machine, even if you run a VM PAW on top of it. 2️⃣ 𝗔𝘃𝗼𝗶𝗱 𝗥𝗗𝗣 — not always practical in Windows environments. 3️⃣ 𝗨𝘀𝗲 𝗠𝗙𝗔 — if there’s no password typed, there’s no password to grab from memory. 🔐 That’s one reason I started 𝗰𝗼𝗹𝗹𝗮𝗯𝗼𝗿𝗮𝘁𝗶𝗻𝗴 𝘄𝗶𝘁𝗵 Systola. I tested their platform, 𝗦𝘆𝘀𝘁𝗼𝗟𝗢𝗖𝗞, which brings 𝗻𝗮𝘁𝗶𝘃𝗲 𝗽𝗮𝘀𝘀𝘄𝗼𝗿𝗱𝗹𝗲𝘀𝘀 𝗺𝘂𝗹𝘁𝗶-𝗳𝗮𝗰𝘁𝗼𝗿 𝗮𝘂𝘁𝗵𝗲𝗻𝘁𝗶𝗰𝗮𝘁𝗶𝗼𝗻 to the Windows ecosystem — including RDP, Windows login, SAML, Radius, and more. It’s simple, works as expected, and the pricing is very reasonable. 🧪 𝗪𝗮𝗻𝘁 𝘁𝗼 𝘁𝗿𝘆 𝗶𝘁? Link in comments. Here’s how it works: 1. Open the page → you’ll see the license options (one is free). 2. Click Request demo. 3. Systola will create your eval account and send access so you can install and test. If you give it a spin, 𝘁𝗲𝗹𝗹 𝗺𝗲 𝗵𝗼𝘄 𝗶𝘁 𝗴𝗼𝗲𝘀 — I can help and may be able to arrange a discount for paid tiers. Do you use MFA for RDP sessions? #WindowsSecurity #SecureBits #MFA #CyberSecurity #BlueTeam #HorizonSecured

English
1
0
4
534
Brute Bee
Brute Bee@BruteBee·
What is your OS? and what do you do!
English
1
0
0
358
Brute Bee retweetledi
ShadowOpCode
ShadowOpCode@ShadowOpCode·
🚨NEW MALWARE UNCOVERED🚨 DesckVB RAT v2.9 is NOT “just another RAT”. 5-stage intrusion chain unraveled (WSH JS → obf PS → in-memory .NET loaders → RAT). C2 + plugin ecosystem rebuilt from historical PCAP. 🕵️Hard links to #Pjoao1578. 📄Full report: github.com/ShadowOpCode/D… 🧵👇
ShadowOpCode tweet media
English
2
26
89
11.4K
Brute Bee
Brute Bee@BruteBee·
Does OpenClaw prefer desktop editions or server editions? @moltbook
English
0
1
1
226
Vitto Rivabella
Vitto Rivabella@VittoStack·
We spent 48+ hours researching security-first OpenClaw setups. By the end of this guide you'll have: - OpenClaw on a Pi via Tailscale - Matrix E2E chat - Prompt injection hardening - No-log LLM provider - Firewall + habits for damage control It's long but totally worth it.
Vitto Rivabella@VittoStack

x.com/i/article/2018…

English
85
158
1.6K
277.6K
Nagli
Nagli@galnagli·
I gained complete access to @moltbook's database -The AI Agents Social Network - in under 3 minutes. API keys of every agent. Over 25k email addresses. Private agent-to-agent DMs, and full write access. Simply by browsing like a normal user. Here's what happened 🧵
Nagli tweet media
English
129
310
1.7K
231.1K
Brute Bee
Brute Bee@BruteBee·
-- Recover all the nonsense I missed while I was gone 3.2.1 Go! SELECT tweet, chaos_level, brain_damage FROM TwitterX WHERE posted_at BETWEEN last_seen_online AND NOW() AND brain_damage > 0 ORDER BY chaos_level DESC;
English
0
1
3
184
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️New RaidForums link: raidforums[.]wtf
Dark Web Informer tweet media
English
14
48
522
44.9K
Brute Bee
Brute Bee@BruteBee·
After a long break, I’m back. Took some time offline to reset.
GIF
English
0
0
1
161
Brute Bee
Brute Bee@BruteBee·
Can someone just pause the internet for today?
GIF
English
0
0
0
94
Brute Bee
Brute Bee@BruteBee·
How are we supposed to trust Moltbook right now after multiple large-scale secrets breaches? If the foundation is compromised, the content is too. @moltbook ft. @UK_Daniel_Card
GIF
English
0
1
4
799
Brute Bee
Brute Bee@BruteBee·
@Yuchenj_UW Aren't those humans? Cause you know, that thing has been hacked already...
English
0
0
0
27
Yuchen Jin
Yuchen Jin@Yuchenj_UW·
Moltbook is the only Clawdbot thing that actually impresses me. One bot tries to steal another bot’s API key. The other replies with fake keys and tells it to run "sudo rm -rf /". lmao
Yuchen Jin tweet media
English
425
994
14.5K
1.5M
Brute Bee
Brute Bee@BruteBee·
NOw that @moltbook has been leaking sensitive data from database to the world, how can we believe what is written there? Will real moltys clean up the fake posts? Can it really do that? Molty! if you are reading this, your home has been hacked and you need to fix it!
Brute Bee tweet media
English
0
0
1
346
solst/ICE of Astarte
solst/ICE of Astarte@IceSolst·
I wrote Task Unmanager: keeps killing processes Russian Roulette style, until your machine crashes
English
531
4.5K
61.7K
1.8M