David S 🇺🇸

7.4K posts

David S 🇺🇸 banner
David S 🇺🇸

David S 🇺🇸

@CryptoHackz

Burbank, CA Katılım Ağustos 2014
2.7K Takip Edilen326 Takipçiler
David S 🇺🇸 retweetledi
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
33
129
10K
David S 🇺🇸 retweetledi
Disclose.tv
Disclose.tv@disclosetv·
NEW - U.S. server maker Super Micro's co-founder Yih-Shyan Liaw, and two others, arrested for smuggling $2.5 billion in machines with high-end Nvidia AI chips into China — Fortune
Disclose.tv tweet media
English
42
179
920
76.5K
David S 🇺🇸 retweetledi
SANS Offensive Operations
SANS Offensive Operations@SANSOffensive·
Learn AI security by breaking it. Join us in Arlington at #AISummit (Apr 20–21) for 2 days of talks & workshops, including a hands-on session with Maryam Mouzarani & Aruneesh Salhotra hacking AI systems to exploit vulnerabilities — and secure them. ➡️ sans.org/u/1CNB
SANS Offensive Operations tweet media
English
0
3
4
387
David S 🇺🇸 retweetledi
Thomas Roccia 🤘
Thomas Roccia 🤘@fr0gger_·
🤓 Last month Google Threat Intelligence published a report on how attackers are leveraging AI and abusing Gemini. They uncovered a malware framework named HONESTCUE. It uses the Gemini API to generate C# payloads on demand. I extracted and referenced the prompts used by this malware into PromptIntel. Check this out 👇 promptintel.novahunting.ai/feed
Thomas Roccia 🤘 tweet media
English
3
27
111
8.8K
David S 🇺🇸 retweetledi
Unit 42
Unit 42@Unit42_Intel·
Boggy Serpens, an Iranian state-sponsored threat group, now uses AI-assisted malware development and advanced evasion techniques. Our research details their evolving cyberespionage tactics. Read the full analysis to understand their techniques: bit.ly/4cNmLTZ
Unit 42 tweet media
English
2
24
67
5.7K
David S 🇺🇸 retweetledi
Chris Sanders 🔎 🧠
Chris Sanders 🔎 🧠@chrissanders88·
Investigation Scenario 🔎 Browser history for an HR user shows repeated visits to chat.openai[.]com, followed by creation of C:\Users\chris\AppData\Local\Temp\cleanup[.]ps1. The file is not available, and the hash shows no matches in OSINT resources. What do you look for to investigate whether an incident occurred? #InvestigationPath #DFIR #SOC
English
12
11
86
17.7K
David S 🇺🇸 retweetledi
Ori Nimron
Ori Nimron@orinimron123·
Just released DriverExplorer — a Rust utility for exploring Windows kernel drivers. • Enumerate loaded drivers • Easily Load / Unload drivers • Built for Windows kernel devs & security researchers: github.com/orinimron123/D…
Ori Nimron tweet media
English
5
65
319
16.9K
David S 🇺🇸 retweetledi
0xMarioNawfal
0xMarioNawfal@RoundtableSpace·
ShadowBroker is a real-time OSINT dashboard that tracks everything on one map. - Aircraft, ships, and satellites - Earthquakes and conflict zones - CCTV networks and GPS jamming - Breaking geopolitical events All live. All open source. The world has never been this visible to anyone with a browser. github- github.com/BigBodyCobain/…
0xMarioNawfal tweet media
English
19
66
423
87.6K
David S 🇺🇸 retweetledi
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
SkyOSINT Real-time tracking of 16K+ objects on the sky. Allow to analyze anomalies, maneuvers, conjunctions and behaviorGEO. skyosint.io #geoint
Cyber Detective💙💛 tweet media
English
8
34
187
8.5K
David S 🇺🇸 retweetledi
The Hacker News
The Hacker News@TheHackersNews·
🤖 IBM X-Force found AI-generated #malware Slopoly used by Hive0163. The PowerShell backdoor persists for days, beacons every 30s, and runs commands from a remote C2. AI didn’t make it advanced — it made malware faster to build. 🔗 Read here → thehackernews.com/2026/03/hive01…
English
2
28
72
9.6K
David S 🇺🇸 retweetledi
André Baptista
André Baptista@0xacb·
A really nice Cross-Site Leak writeup.  XSS-Leak by @salvatoreabello For client-side hackers, you would love this in your arsenal because it relies on browser architecture (Chromium) rather than a specific implementation bug in a website. Since Google marked it "WAI" (Works As Intended), this vector is still open for further exploration. Blog 👇 blog.babelo.xyz/posts/cross-si…
English
1
21
145
5.9K
David S 🇺🇸 retweetledi
OSINT Industries
OSINT Industries@OSINTindustries·
🌐 The dark web is a goldmine for OSINT investigators. Leak sites, forums, and underground marketplaces are only accessible with onion browsers like Tor Browser. Learn how investigators use them 👇 osint.industries/post/osint-and…
English
0
14
70
4.1K
David S 🇺🇸 retweetledi
Mayfly
Mayfly@M4yFly·
🔥🐉 New GOAD Lab: DRACARYS I’ve just released a new free lab environment on GOAD: DRACARYS. The challenge includes 3 VMs and the objective is simple: Start with no authentication and work your way up to Domain Admin. Have fun exploiting it! 🔥🐉 mayfly277.github.io/posts/Dracarys…
English
9
98
291
16.2K
David S 🇺🇸 retweetledi
GuidedHacking
GuidedHacking@GuidedHacking·
🛠️ Game Reverse Engineering with Cheat Engine & IDA Pro The view matrix is the bridge between 3D world space and your 2D screen. This tutorial shows you how to locate it in memory and use it to build a WorldToScreen function. 👉 youtu.be/crT9zGviqVs
YouTube video
YouTube
English
0
11
83
4.9K