IntelCorgi

2.7K posts

IntelCorgi banner
IntelCorgi

IntelCorgi

@IntelCorgi

cyber threat intelligence, OSINT, and corgi hair. Thoughts are my own, RT/Like != Endorsement. (He/Him)

Chicago, IL Katılım Haziran 2018
1K Takip Edilen729 Takipçiler
IntelCorgi
IntelCorgi@IntelCorgi·
@rez0__ In addition to the trusted access program ?
English
0
0
1
130
Joseph Thacker
Joseph Thacker@rez0__·
Here’s the sauce: - agent md file with lots of disclaimers about how it’s approved testing - a bunch of hacking skills - /goal find a crit on target . com That’s literally 90% of the way there and enough to blow anyone’s mind who hasn’t been convinced yet.
Joseph Thacker@rez0__

okay im calling it officially. codex is cracked. if you're a bb hunter and you dont have a hackbot set up yet, i recommend codex with gpt5.5 over claude code.

English
21
21
336
34.2K
vx-underground
vx-underground@vxunderground·
Did your slop Python script accidentally transfer $10,000,000 to a stranger? Did your vibe coded app accidentally leaked 300,000 peoples phone numbers, e-mail addresses, and passport? Don't worry, fam. The folks over there at ... Corgi ... now provide AI insurance.
English
71
130
1.8K
120.6K
IntelCorgi retweetledi
Andrew Morris (afk)
Andrew Morris (afk)@Andrew___Morris·
Howdy folks! Taking a break from my twitter break to let yall know that we released a new @GreyNoiseIO product yesterday. It's called Project Swarm. We've been quietly not-so-quietly working on it for a few years. You can buy it now. It costs $1. There are lots of vulnerabilities on edge-facing apps. To catch in-the-wild exploitation of them, we @ GreyNoise run sensors on the internet. New AI models means more vulnerabilities being identified and exploited, and FASTER. Long term, software and hardware will probably get better, but in the meantime we're gonna have to deal with A LOT of vulnerabilities. At GreyNoise, the sensors we run are basically honeypots- we bait attackers to scan and exploit them which enables us to learn where the attackers are, which vulnerabilities they are exploiting, what it drops, and what it looks like on the wire. From ~2020-now it took us years to build up our fleet. Now anyone can use our new product to deploy their own sensors on their own networks, or an entire fleet of any size, in a day. You can rip back the data and do whatever you want with it. You can resell it, put it into your product, or just stare at it- whatever you want! On our side, we aggregate the data and pour it into a community dataset that everyone shares. As more people join, the data gets bigger and better. Couple neat features: - Sensor deployment is a single bash command on any modern linux distro that supports iptables and wireguard. - Sensors and vulnerable software (profiles) are abstracted into different logical concepts, which means the "what" and "where" are different things, and the sensor is not constrained by the compute required to run the vulnerable software. Also, no matter how hacked the profile (honeypot) gets, it can't touch your host sensor or the rest of your network. - Sensors can run fake honeypots, real software, or even real hardware (bridged with a raspberry pi) like old crappy routers and modems (or expensive firewalls and VPN gateways 👀) - You can create dynamic blocklists that block IPs sourced from your own sensors in real time, so if a remote IP address *looks at your network* the wrong way, you block them instantly. - All the PCAP data is available to you in a gorgeous and intuitive interface at near real time and fully enriched against all of our (thousands of) rules. We're working on the host metadata (malware, syscalls, host behaviors) as well, but this will come later. - If we don't tag a CVE that's interesting to you, you can write a Suricata rule to tag it yourself once and your data gets tagged with it in real time forever. - You can instantly download PCAPs of any exploits that hit your sensors. - If you don't want your data shared with the community dataset, you can talk to our team and we'll work out rights to make it private. Check it out! There's a lot of moving pieces to make this work and we expect bugs, but it's available right now. Join the fight! greynoise.io/project-swarm
Andrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet media
English
14
83
354
36K
IntelCorgi retweetledi
Will
Will@BushidoToken·
I’m not gonna lie, TLP restricted CTI reports with massive AI-generated cover pages of scary terminators from Russia & cyber skeletons from China lose all seriousness to me 😂
English
5
5
87
9.5K
IntelCorgi retweetledi
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
47
540
4.4K
89.2K
Jake Knowlton
Jake Knowlton@j2k3k·
airdrop, free mint, giveaway, $SOL, $ETH, $BTC, pump, moonshot, 100x, gem, presale, whitelist, WL spot, alpha leak, NFT drop, rugpull, shill, DYOR, HODL, degens, trenches, CA, contract address, LFG, WAGMI, to the moon, bullish, bear market, liquidity, stake, yield farm, Metamask, Phantom wallet, seed phrase, recovery, lost access, 0day, CVE, RCE, pentest, bug bounty, HackerOne, Bugcrowd, exploit, shellcode, reverse shell, privilege escalation, OSCP, CEH, red team, blue team, APT, ransomware, phishing kit, credential stuffing, combolist, stealer logs, dumps, fullz, carding, SIM swap, OSINT, recon, Shodan, Metasploit, Burp Suite, Cobalt Strike, leaked, breach, database dump, wallet drained, stolen crypto recovery, hack my ex, recover funds, ethical hacker for hire, DM for services, verified hacker, crypto recovery expert, lost seed phrase help
English
4
1
8
1.8K
Jake Knowlton
Jake Knowlton@j2k3k·
“Unfortunately your talk was not accepted but we would like to thank you for…”
h@hyoki57

English
4
3
42
4.9K
IntelCorgi
IntelCorgi@IntelCorgi·
Seeing people recommend OSINT framework as “an information gathering tool for hackers and law enforcement” reeks of “I just asked ChatGPT to write an article about OSINT”
IntelCorgi tweet mediaIntelCorgi tweet media
English
0
0
0
74
IntelCorgi retweetledi
Ted Cutezynski
Ted Cutezynski@shrugdeaIer·
Artemis II is a great reminder that we still don’t need Elon for literally anything.
English
1.7K
13.8K
126.7K
2M
IntelCorgi retweetledi
Anish Moonka
Anish Moonka@anishmoonka·
NASA has 32 cameras on the Artemis II spacecraft. The top science priority during the Moon flyby was the four astronauts looking out the window and talking about what they saw. NASA's lunar science lead confirmed it. What the crew says out loud about the Moon's surface matters more to the science team than anything the cameras capture. NASA trained this crew in Iceland's volcanic highlands and at an impact crater in Labrador, Canada, teaching them to read rock textures and spot geological details at 25,000 mph. There's a reason NASA trusts human eyes over cameras. In 1972, Apollo 17 astronaut Harrison Schmitt was walking near a small crater called Shorty when he scuffed the dirt with his boot. The soil underneath was orange. Schmitt was the only trained geologist to ever walk on the Moon, and he got so excited he blurred most of his own photos. That orange soil turned out to be tiny glass beads from a volcanic eruption 3.64 billion years ago, one of the biggest finds of the entire Apollo program. A boot and a pair of trained eyes caught what no camera did. For this flyby, NASA sent the crew a final list of 30 surface targets. They killed all the cabin lights to cut window reflections. They worked in pairs, rotating every 55 to 85 minutes, calling out craters and lava flows while scientists at Johnson Space Center analyzed everything in real time. Pilot Victor Glover reported that the Moon's south pole, where NASA wants to land astronauts by 2028, looked "more jagged" than the north with much steeper terrain. One observation from a human eye at 4,070 miles could shape where the next crew touches down. At 6:44 PM Eastern, Orion slipped behind the far side and went radio silent for 40 minutes. Four people, completely cut off from every other human alive, the Moon blocking every signal back to Earth. The last time humans experienced that was December 1972. They broke the all-time distance record on the way. Apollo 13 held it for 56 years at 248,655 miles from Earth. Artemis II passed that mark and kept going to 252,760. Jim Lovell, who commanded Apollo 13 and held that record his whole life, died last August at 97, eight months before these four beat it. Before he died, Lovell recorded a message for the crew. "Welcome to my old neighborhood," he told them. "Don't forget to enjoy the view." The crew named two craters during the flyby. One for their spacecraft, Integrity. The other, Carroll, for Commander Reid Wiseman's late wife, a nurse who cared for newborns and died of cancer in 2020 at 46. Wiseman has raised their two daughters alone since. When Jeremy Hansen read the name to Mission Control, his voice broke. The crew hugged. Wiseman and Koch wiped tears. Then they got back to work, because they still had hours of Moon left to map with their eyes.
NASA@NASA

LIVE: Watch with us as the Artemis II astronauts make their closest approach to the Moon, traveling farther from Earth than ever before. twitter.com/i/broadcasts/1…

English
32
1K
7.8K
733.4K
IntelCorgi retweetledi
Law in Japan
Law in Japan@Colin_P_A_Jones·
@RGA This is Major Tom to tech support I’m clicking on the tab But it’s acting in a most peculiar way And the menu ribbon looks quite different today
English
33
726
5K
118.9K
IntelCorgi retweetledi
Chris Combs (iterative design enjoyer)
ARTEMIS II AS SEEN BY THE OFFICIAL NASA CESSNA THIS IS THE BEST LAUNCH VIDEO AND IT ISN'T CLOSE
English
267
10.1K
68.9K
2.2M
IntelCorgi retweetledi
Governor Gretchen Whitmer
Governor Gretchen Whitmer@GovWhitmer·
From Michigan to the moon 🚀   We're so proud to watch Grand Rapids native and the first woman orbiting the moon, Christina Koch, take off on this historic mission.    Good luck to Christina and the Artemis II crew as they travel farther from Earth than any humans before!
NASA@NASA

Liftoff. The Artemis II mission launched from @NASAKennedy at 6:35pm ET (2235 UTC), propelling four astronauts on a journey around the Moon. Artemis II will pave the way for future Moon landings, as well as the next giant leap — astronauts on Mars.

English
70
167
1.5K
48.5K
IntelCorgi retweetledi
NASA
NASA@NASA·
For the first time in over 50 years, humans are Moonbound. At 6:35 p.m. EDT (2235 UTC) NASA’s Space Launch System rocket and the Orion spacecraft lifted off from the agency’s Kennedy Space Center in Florida, sending four astronauts on a planned test flight around the Moon and back. go.nasa.gov/4tlRfRS
NASA tweet media
English
2.3K
25.4K
131.7K
3.9M
IntelCorgi retweetledi
vx-underground
vx-underground@vxunderground·
vx-underground tweet media
ZXX
21
400
4.9K
71.6K
IntelCorgi
IntelCorgi@IntelCorgi·
@vxunderground Sharing a screenshot from when a threat actor emails you from a compromised account probably encourages others to do the same.
English
1
0
2
557
vx-underground
vx-underground@vxunderground·
It's a genuine question with no fowl intent. I'm curious on the perception of it. I've always enjoyed communicating with Threat Actors, I've enjoyed seeing how they operate and who they are as humans. Although, I am well aware many of my peers do not feel the same because they have to deal with destruction they cause and see first hand the people they hurt due to their greed, indifference, or (without arm charm experting) sociopathic behavior.
English
13
0
114
9.4K