Luis Vacas de Santos

1.8K posts

Luis Vacas de Santos banner
Luis Vacas de Santos

Luis Vacas de Santos

@CyberVaca_

Cybersecurity Analyst, Evil-WinRM Creator

Katılım Şubat 2018
652 Takip Edilen2K Takipçiler
Luis Vacas de Santos retweetledi
Silky
Silky@S1lky_1337·
Releasing KslKatz. Combining KslDump and GhostKatz to dump LSASS using no-fix KslD.sys memory read to bypass PPL. Extracts MSV1_0 NT hashes and WDigest cleartext passwords (if enabled) from LSASS using a Microsoft-signed driver. github.com/S1lkys/KslKatz
Silky tweet media
English
4
112
336
16.7K
Luis Vacas de Santos retweetledi
Rishi
Rishi@rxerium·
🚨 CVE-2026-3055 (CVSS 9.3), a unauth memory overread vulnerability affecting Citrix NetScaler ADC and NetScaler Gateway appliances that could see active exploitation itw Vulnerability detection script available here: github.com/rxerium/rxeriu… Patches are available as per Citrix's advisory: support.citrix.com/support-home/k…
Rishi tweet media
English
11
65
293
25.5K
Luis Vacas de Santos retweetledi
Aurélien Chalot
Aurélien Chalot@Defte_·
Thanks to Azox, it is now possible to use psexecsvc (github.com/sensepost/susi…) through a socks proxy like ntlmrelayx allowing executing system commands via a trusted service, as NT System, and evading EDR's. Also thanks to @HackAndDo for his fixes :D
Aurélien Chalot tweet media
English
2
74
235
11.8K
Luis Vacas de Santos retweetledi
SciTech Girl
SciTech Girl@scitechgirl·
🚨 DIABETES CURE… OR THE BEGINNING OF A MEDICAL REVOLUTION? For over a century, diabetes has meant daily injections, constant monitoring, and a lifetime of management. But now, scientists in China and researchers at Vertex Pharmaceuticals in the United States have done something shocking, they used stem cells to create new insulin-producing cells and transplanted them into real patients. And here’s the twist… Some people with Type 1 diabetes started making their own insulin again. No pump. No syringe. Just living cells doing their job. It’s not a full cure yet. Trials are still small, and long-term results are unknown. But for the first time, medicine isn’t just managing diabetes, it’s trying to rebuild the pancreas itself. Science fiction? Not anymore..
SciTech Girl tweet media
English
649
6.4K
18.9K
993K
Luis Vacas de Santos retweetledi
ZoomEye
ZoomEye@zoomeye_team·
🚨 CVE-2026-2006: Vulnerability Alert Critical Remote Code Execution via Malicious PL/Python UDF! An attacker with CREATE privilege can define a PL/Python user-defined function containing arbitrary Python code that executes with the privileges of the PostgreSQL server process (typically 'postgres' user), enabling full remote code execution on the database host. Full Vulnerability Details & Analysis at DarkEye: 🔗 darkeye.org/vuln/cve/CVE-2… 🔍 Identify Targets via ZoomEye: Filter: vul.cve="CVE-2026-2006" Search Dork: app="PostgreSQL DB" Exposure: 3M+ instances identified globally. ZoomEye Search Link: 👉 zoomeye.ai/searchResult?q… #PostgreSQL #RCE #PLPython #PrivilegeEscalation #DBSecurity @darkeye_team
ZoomEye tweet media
English
3
26
72
6K
Luis Vacas de Santos retweetledi
Thierry
Thierry@datafuel0·
#Paramspider fetches archived URLs for domains from Wayback Machine, filters useless ones, and supports bulk input, streaming, proxies, and parameter placeholders. 🔥🔥Credit: @0xAsm0d3us repo link: github.com/devanshbatham/…
English
0
3
49
2.3K
Luis Vacas de Santos retweetledi
elhacker.NET
elhacker.NET@elhackernet·
Más de 1.800 servidores Windows comprometidos por el malware BADIIS en una campaña masiva de envenenamiento SEO blog.elhacker.net/2026/02/mas-de…
Español
2
68
208
12.9K
Luis Vacas de Santos retweetledi
PatchPoint.Official
PatchPoint.Official@_patchpoint_·
Notepad RCE (CVE-2026-20841) is getting a lot of attention. This is part of the content provided through our subscription. Check out our simple analysis and judge for yourself.😀 github.com/patchpoint/CVE… #notepad #RCE
English
1
28
84
27K
Luis Vacas de Santos retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Microsoft Office Word 0-day Vulnerability Actively Exploited in the Wild Source: cybersecuritynews.com/microsoft-offi… A critical zero-day vulnerability in Microsoft Word, tracked as CVE-2026-21514, was disclosed on February 10, 2026, allowing attackers to bypass essential security protections. CVE-2026-21514 exploits a weakness in how Microsoft Word handles security decisions based on untrusted inputs, categorized as CWE-807. The vulnerability specifically bypasses Object Linking and Embedding (OLE) mitigations implemented by Microsoft to protect users from malicious COM/OLE controls. These OLE controls enable documents to embed and interact with external objects. However, improper validation allows attackers to circumvent protective measures. #cybersecuritynews #vulnerability
Cyber Security News tweet media
English
7
127
365
23.6K
Luis Vacas de Santos retweetledi
Dark Web Informer
Dark Web Informer@DarkWebInformer·
‼️ CVE-2025-1974: Kubernetes IngressNightmare Vulnerability CVSS: 9.8 PoC: github.com/hakaioffsec/In… PoC Published: March 26th, 2026
English
6
37
159
16K
Luis Vacas de Santos retweetledi
SkinsMonkey
SkinsMonkey@skinsmonkey·
200 IQ teamwork 🔥
Nederlands
5
41
1.2K
91.8K