sergio dote retweetledi
sergio dote
467 posts


@kunoichi_jp_ How hard would it be to trace my ancestors in Japan?
English
sergio dote retweetledi

For windows.
The second you plug that drive in, Windows logs the Volume Serial Number to the Registry.
When the Forensice analyst (or Feds) audit that machine, they see:
Device "KingstonDT" connected at 14:00.
Prefetch shows "Mimikatz.exe" ran at 14:01.
Unplugging the drive didn't scrub the Registry.

IT Guy@T3chFalcon
If somebody plugs in a USB drive, copies confidential files, deletes the files from the computer, and removes the USB immediately after, do you think investigators can still know the exact USB device that was connected?
English
sergio dote retweetledi

Reproducing a Double Free RCE in Apache CVE-2026-23918 on the most used software on the internet with one prompt that costs like $0.001 via DeepSeek is scary as hell.
Now, anyone with zero knowledge can hack the internet.
(Not default installs though. You need mod_http2 enabled.)

H4x0r.DZ 🇰🇵@h4x0r_dz
Apache HTTP Server version 2.4.66 double free and possible RCE httpd.apache.org/security/vulne…
English

Is it really 100 (99?) days?
🔥 Bad 'BK' Kobold 🔥 🍺@badkobold
I don't know who needs to hear this, but DEFCON is approaching...
English
sergio dote retweetledi

Turn Claude Code into your offensive security research assistant. Specialized AI subagents for authorized penetration testing plan engagements, analyze recon, research exploits, build detections, audit STIGs, and write reports. github.com/0xSteph/pentes…
English
sergio dote retweetledi

🚨 BREAKING
ShinyHunters claims to have accessed internal systems linked to Anthropic’s Mythos model — sharing screenshots of:
User management panels
AI experiment dashboards
Model performance & cost analytics
⚠️ At this stage, authenticity is unverified — but if confirmed, this would be a major escalation:
AI models designed to find vulnerabilities… becoming targets themselves.
This isn’t just a breach story.
It’s a preview of the next cyber battleground: AI infrastructure.
More to come.
#CyberSecurity #AI #DataBreach #ShinyHunters #Infosec #DDW




English
sergio dote retweetledi

@TwinzDynamic I can still hear it in my head .. dayyyyoooonaaaaaa
English

Did you know there are 4 unique versions of Daytona USA released worldwide on #SEGA Saturn?
But two main titles in which are distinct
The original Arcade port from the consoles launch and 'Championship Edition' which updated and fixed many issues with the rushed launch title.

English
sergio dote retweetledi

🚨Shadowbroker es el dashboard OSINT más boleta que vas a ver:
→ Tracking EN VIVO de los 11 portaaviones de la US Navy.
→ Satélites espía (2.000+) orbitando (color por misión).
→ Zonas de jamming GPS con intensidad real-time.
→ Jets privados de los millonarios.
→ +25.000 barcos + 4.400+ cámaras CCTV live del mundo.
Haces click derecho en cualquier parte del mapa y te tira un dossier completo de inteligencia (país, líder, imágenes satélite, todo).
Mapa oscuro brutal estilo película de hackers. 100% open source, self-hosted con Docker, casi 5k stars.
REPOOO👇
Español
sergio dote retweetledi

Tu IA ahora puede hacer pentesting real! AIDA conecta modelos como Claude o Gemini con más de 400 herramientas (Nmap, Sqlmap) para auditorías autónomas. Aprende, automatiza y mejora tu seguridad. 💥🔓🧠⚠️ #ethicalhacking #redteam #ai #ciberseguridad #pentest #recon #exploit

Español
sergio dote retweetledi

sergio dote retweetledi

🚨 BREAKING: The cybersecurity industry is about to get completely disrupted.
Someone just open-sourced a fully autonomous AI Red Team.
It's called PentAGI. 8,200+ stars on GitHub.
Not one AI agent. An entire simulated security firm. Researchers, developers, pentesters, and risk analysts. All AI. All coordinating with each other before launching a single attack.
No Cobalt Strike. No $100K/year pentest retainers. No OSCP required.
Here's what's inside this thing:
→ An Orchestrator agent that plans the full attack chain
→ A Researcher agent that gathers intel from the web, search engines, and vulnerability databases
→ A Developer agent that writes custom exploit code on the fly
→ An Executor agent that runs 20+ pro security tools (nmap, metasploit, sqlmap, and more)
→ A memory system that learns from every engagement and gets smarter over time
Here's the wildest part:
It runs everything inside sandboxed Docker containers. Full isolation. It picks the right container image for each task automatically.
It has a knowledge graph powered by Neo4j that tracks relationships between targets, vulnerabilities, tools, and techniques across every single test.
Cybersecurity firms charge $25K-$150K per engagement for this exact workflow.
This is free.
100% Open Source. MIT License.

English


















