Kagame Opana

453 posts

Kagame Opana banner
Kagame Opana

Kagame Opana

@KagameO01

Tech Enthusiast😃 || Spray and Pray

Heap Katılım Haziran 2023
1.6K Takip Edilen142 Takipçiler
Kagame Opana retweetledi
John Scott-Railton
John Scott-Railton@jsrailton·
BREAKING: powerful iPhone hacking tools used by Chinese criminals originated from US defense giant L3 Harris. The $LHX zero-click exploits went to Russian spies too. Unbelievable harm to our collective security. Scoop by @lorenzofb, here's why this matters 1/
John Scott-Railton tweet mediaJohn Scott-Railton tweet media
English
31
876
2.4K
269.7K
Kagame Opana retweetledi
Stephen Sims
Stephen Sims@Steph3nSims·
I want to share a quick thought for people in cyber security. This will be my longest tweet ever. I’ve spoken to many lately who are having an existential crisis from the constant posts about “the end of cybersecurity jobs.” Yes, things are changing quickly. This is a significant moment for the tech industry. Change can be uncomfortable. But we’ve seen cycles like this before. • When GitHub and open source took off, people said software engineers would disappear because code was free. • When AWS and cloud computing emerged, people said infrastructure jobs would vanish. • When fuzzing and SAST tools improved, people said vulnerability research would disappear. • Virtualization would eliminate infrastructure jobs. • Mobile computing was going to end desktop dev. • Exploit mitigations would end exploitability. It didn't. Each time automation improved, the amount of software grew faster than the automation. It does feel "different" this time as it's explosive. Some roles will shrink: • repetitive pentesting • basic vulnerability scanning • tier-1 SOC monitoring But other areas are expanding rapidly: • AI system security • supply chain security • identity architecture • autonomous agent security • critical infrastructure protection Historically, every time we eliminate one class of bugs, new classes emerge. Right now people are vibe-coding entire systems, giving AI access to their machines, crossing trust boundaries, and deploying autonomous agents with excessive permissions. The legal and regulatory world is nowhere close to ready. There will absolutely be new failure modes. Humans are amazing and always adapt, finding new ways to do things. The worst thing you can do right now is fall into a doom loop. ...and I’ll be honest, I too have felt the "psychological paralysis" a few times thinking, “Is this time different?” It's especially impactful when it comes from someone I respect in the community. There are certainly unknowns, in an industry where we've become accustomed to predictability. But... the majority of those reactions are usually driven by social media, not reality. Platforms like X reward engagement, and sensational doom posts spread faster than measured thinking. If you see something like: “Holy #$%^! Opus 66.6 just found every bug in Chrome and replaced 50 startups!” …mute it and move on. Instead: Stay curious. Learn the new technology. Adapt your skillsets. Build things. We’ll get through this transition the same way we always have. If I'm wrong then Sam Altman better be right about UBI! :) I'm sure that if this tweet gets any engagement that I'll get some heat for it, but a good friend of mine reminds me often to focus on what you have control over. I'll revisit this tweet at DEF CON 40!
English
55
308
1.5K
130.6K
Kagame Opana retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
I am excited to release the seventh article in the Exploiting Reversing Series (ERS). Titled “Exploitation Techniques | CVE-2024-30085 (part 01)” this 119-page technical guide offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/03/04/exp… Key features of this edition: [+] Dual Exploit Strategies: Two distinct exploit versions using Token Stealing and I/O Ring techniques. [+] Exploit ALPC + PreviousMode Flip + Token Stealing: elevation of privilege of a regular user to SYSTEM. [+] Exploit ALPC + Pipes + I/O Ring: elevation of privilege of a regular user to SYSTEM. [+] Solid Reliability: Two complete working and stable exploits, including an improved cleanup stage. [+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability. The article guides you through the two distinct techniques for exploiting the CVE-2024-30085 Heap Buffer Overflow vulnerability. I would like to thank Ilfak Guilfanov (@ilfak on X) and Hex-Rays SA (@HexRaysSA on X) for their constant and uninterrupted support, which has helped me write these articles over time. I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback! Enjoy your reading and have an excellent day.
Alexandre Borges tweet media
English
5
89
312
29.2K
Kagame Opana retweetledi
I am Jakoby
I am Jakoby@I_Am_Jakoby·
One command. Full recon pipeline ➡️ enumerates subdomains from 7+ sources in parallel ➡️ resolves DNS, maps CNAME chains ➡️ detects takeover vulnerabilities ➡️ fingerprints the tech stack ➡️ auto-probes sensitive paths it discovers ➡️ tests auth bypasses on blocked endpoints ➡️ as of yesterday generates HackerOne-ready markdown reports (no Ai involved, programmatically generated) Each phase feeds the next. Not a wrapper. Not a script calling subfinder. Nuclei isnt even involved. Custom distributed architecture, built for bounty hunting. and I am continuing to upgrade it every single day If you have functionality you think I should add, drop suggestions below. I'm also looking for a few established bounty hunters to get early access and help me stress test it. DM me if you're interested. and again here is a REAL example output: github.com/Unit-259/subEn…
I am Jakoby tweet media
I am Jakoby@I_Am_Jakoby

if my tool wasnt real this wouldnt be possible lol here is the proof output too github.com/Unit-259/subEn… 🎵 thats right. I am your god now bow to me 🎵

English
12
33
261
28.1K
freakyclown
freakyclown@_Freakyclown_·
So here are the five winners! @KagameO01 @mccleod1290 @KilluaZold878 @0xpelz @kabir_haidar_01 You were picked at random from a shortlist. So no favouritism from my end. I hope you all the best with the course, please keep everyone updated! Winners: I’ll be in touch soon
freakyclown@_Freakyclown_

Remember this? Thanks to @Jhaddix we now have FIVE courses to give away for @the_IDORminator course on @arcanuminfosec So this Valentines day, to win 1 of 5 codes, I want you to write why this course would mean so much to you. Rules below in post 2/2

English
4
0
11
1.1K
Kagame Opana retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
I am excited to release the extended version of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)" this 293-page deep dive offers a comprehensive roadmap for vulnerability exploitation: exploitreversing.com/2026/02/11/exp… Key updates in this extended edition: [+] Dual Exploit Strategies: Two distinct exploit versions. [+] Exploit ALPC Write Primitive Edition: elevation of privilege of a regular user to SYSTEM. [+] Exploit Parent Process ID Spoofing Edition: elevation of privilege of an administrator to SYSTEM. [+] Solid Reliability: A completely stable and working ALPC write primitive. [+] Optimized Exploit Logic: Significant refinements to the codebase and technical execution for better stability and predictability. For those who have read the original release, whose exploit was working, my strong recommendation is that you adopt this extended edition as definitive. The article guides you through the entire lifecycle of an exploit: from initial reverse engineering and vulnerability analysis to multiple PoC developments and full exploitation. I hope this serves as a definitive resource for your research. If you find it helpful, please feel free to share it or reach out with your feedback! Enjoy your reading and have an excellent day day.
Alexandre Borges tweet media
English
4
81
305
14.5K
Kagame Opana
Kagame Opana@KagameO01·
@_Freakyclown_ @Jhaddix @the_IDORminator @arcanuminfosec the course would mean very much to me, it's rare to get such opportunities where am from and will very much appreciate it, the course will propel my career in infosec, started doing bug bounties recently, I've done some labs at the wsa and read blogs.
English
1
0
0
104
freakyclown
freakyclown@_Freakyclown_·
Remember this? Thanks to @Jhaddix we now have FIVE courses to give away for @the_IDORminator course on @arcanuminfosec So this Valentines day, to win 1 of 5 codes, I want you to write why this course would mean so much to you. Rules below in post 2/2
freakyclown@_Freakyclown_

I hate this kind of attitude that @the_IDORminator is getting! Ive been a professional hacker for 30 years, old enough that I don’t need to buy courses, but smart enough to know I don’t know everything. There is always something to learn! So im going to buy 2 and give one away!

English
29
6
46
12.2K
Kagame Opana retweetledi
Alexandre Borges
Alexandre Borges@ale_sp_brazil·
I am pleased to announce the publication of the sixth article in the Exploiting Reversing Series (ERS). Titled "A Deep Dive Into Exploiting a Minifilter Driver (N-day)", this 251-page article provides a comprehensive look at a past vulnerability in a mini-filter driver: exploitreversing.com/2026/02/11/exp… It guides readers through the entire investigation process—beginning with binary diffing and moving through reverse engineering, deep analysis and proof-of-concept stages into full exploit development. I hope this serves as a valuable resource for your research. If you enjoy the content, please feel free to share it or reach out with feedback. Have an excellent day!
Alexandre Borges tweet media
English
10
165
595
30.3K
Kagame Opana retweetledi
Cyber Detective💙💛
Cyber Detective💙💛@cyb_detective·
Kagi Translator - fast and high quality online translator - customise translation style, formality, gender preferences and context - 230+ languages + a lot of dialects (12 Arabic, 4 Italian etc) translate.kagi.com (20000 characters one time FREE, no login required)
Cyber Detective💙💛 tweet media
English
1
8
34
3K
Kagame Opana retweetledi
inversecos
inversecos@inversecos·
Red teamers, no need to “pull” clipboard data when Windows already saves it all on disk for you in a neat little file 🗿 (including past clipboard items) inversecos.com/2022/05/how-to…
inversecos tweet media
IT Guy@T3chFalcon

Most red teamers ignore the clipboard. You can pull: – VPN creds – MFA tokens – AWS keys – Password manager dumps All from CTRL+C. Nobody checks it. Nobody clears it. But it’s always there. Use it. 👊🏾

English
22
312
1.6K
131.6K
Kagame Opana retweetledi
Stephen Sims
Stephen Sims@Steph3nSims·
I will be streaming a portion of the SANS SEC660 course I'm teaching today in DC on Introduction to Windows Exploit Development. We will use ROP to get around DEP on Windows 11. 1PM PT youtube.com/watch?v=cbIEwz…
YouTube video
YouTube
English
2
40
208
15.8K
Kagame Opana retweetledi
Griffin Glynn
Griffin Glynn@hatless1der·
The Ultimate OSINT Collection (@startme) ⭐UPDATES!⭐ ✅Added a section for OSINT Newsletters! ⭐Noted a few favorite resources for each section ➕Added some new content 🚫Removed dead links 💤Removed outdated content Visit: start.me/p/DPYPMz/the-u…
Griffin Glynn tweet media
English
6
101
392
41.2K
vx-underground
vx-underground@vxunderground·
Anyone in the chat who couldn't compile "Hello World" was put in a different chatroom called "Skid dumpster", or something, and it was filled with people asking for help on how to compile code. All he did was berate them
vx-underground tweet media
English
10
3
361
20.2K
vx-underground
vx-underground@vxunderground·
One time I joined this cybersecurity Discord. It was administrated by some cybersecurity guy on Xitter who has like, 5,000 followers, or something. When I joined he berated me, called me a skid, told me to kill myself unless I could compile "Hello World" in C
vx-underground tweet media
English
45
28
1.1K
54.9K
Stephen Sims
Stephen Sims@Steph3nSims·
Would you be interested in a stream this Friday on patch diffing a 2025 Microsoft patch?
English
21
12
160
8K