Dick Reverse

282 posts

Dick Reverse

Dick Reverse

@Sithroll

pinpin @diateam_labs

Katılım Mayıs 2013
317 Takip Edilen135 Takipçiler
Dick Reverse retweetledi
Olivier🐿️
Olivier🐿️@gloupin·
Il faut que les pseudo influenceurs cyber arrêtent de diffuser des fausses informations sur les fuites... Oh, un nouveau site qui recense les fuites "avérées" et relayent les fausses informations sur les fuites. Les gens de la data, arrêtez de vous improviser experts cyber...
Français
3
1
7
673
Dick Reverse retweetledi
Unlock Your Brain, Harden Your System
La 10e édition de notre conférence la plus à l'Ouest est terminée ! Un grand merci à tous : sponsors, intervenants et public, toujours aussi présents et enthousiastes. Vous êtes la raison pour laquelle l'événement continue d'exister. 💪 Kenavo da vloaz ! #UYBHYS25 #UYBHYS
Unlock Your Brain, Harden Your System tweet media
Français
0
4
13
352
Dick Reverse retweetledi
mr.d0x
mr.d0x@mrd0x·
The funniest part about this is that in my experience a tweet talking about ~80 lines of HTML racks up a lot more engagement than some insane low-level windows/malware stuff. I'm assuming it's because it's easier to understand for the general public. Might have to start building HTML malware if @vxunderground approves 😂
vx-underground@vxunderground

I'm always watching what @mrd0x is publishing because he is the only malware-related security researcher finding new initial access techniques. He's the LeBron James on finding weird social engineering malware delivery techniques. Bro is up to some funny business

English
12
13
218
21K
Dick Reverse retweetledi
RedTeam Pentesting
RedTeam Pentesting@RedTeamPT·
🚨 Our new blog post about Windows CVE-2025-33073 which we discovered is live: 🪞 The Reflective Kerberos Relay Attack - Remote privilege escalation from low-priv user to SYSTEM with RCE by applying a long forgotten NTLM relay technique to Kerberos: blog.redteam-pentesting.de/2025/reflectiv…
English
8
174
424
38.6K
Dick Reverse retweetledi
Florian Roth ⚡️
Florian Roth ⚡️@cyb3rops·
“Both sides get paid to do their job.” Sure. But do you really understand what the red team’s job is? It’s not to win. It’s not to flex. It’s not to build cool malware. The job is to make the blue team better. That’s the purpose of the simulation. That’s the point of red teaming. No, red teams don’t need to write detection tools. But they should know their role in the bigger picture. I’m not convinced everyone does.
Florian Roth ⚡️ tweet media
Chetan Nayak (Brute Ratel C4 Author)@NinjaParanoid

@cerbersec @cyb3rops This point "offensive community isnt responsible for devving defense" is exactly what Blueteams need to understand. Both sides get paid to do their job, but BT thinks RT should do the job of BT too. lol.

English
7
25
155
22.9K
Dick Reverse retweetledi
Dick Reverse retweetledi
SinSinology
SinSinology@SinSinology·
🔥💀My Advanced .NET Exploitation training is now open for register! bit.ly/4hwNFyM 32-hours of intense .NET exploitation (PoC||GTFO) We'll be exploiting 15+ remote code execution chains (25 bugs in total) 🪲 I’d truly appreciate your support, your RT would mean a lot!🙏
SinSinology tweet media
English
7
89
276
43.8K
Dick Reverse retweetledi
丂卄ㄖᗪ卂几 - 👋 crack fingers
Computer forensic folks. Can anyone recommend a tool to ‘undo’ a Gaussian blur? I want to do a demo showing how you can unblur an image. Did it on a CTF years back that needed it for a challenge, now can’t find the tool.
English
36
48
782
134.1K
Dick Reverse retweetledi
Alexandre Dulaunoy @adulau@infosec.exchange
Security conferences should stop inviting self-proclaimed 'infosec rockstars' for keynotes. Instead, they should take risks by selecting speakers who have done real research or meaningful work—not those who recycle news headlines and charge hefty fees to show up.
English
16
26
299
20.4K
Dick Reverse retweetledi
vx-underground
vx-underground@vxunderground·
We have a profound respect for the video game cheat makers and video game reverse engineers. The video game cheat producers and video game reverse engineers are very much disenfranchised by the information security community. There is an innate bias and condescending tone directed toward them because of the dislike of video game cheaters and the false belief that this skillset (video game reverse engineering) is not an applicable skillset in real-world scenarios. This cannot be further from the truth. Individuals capable of reverse engineering video games and developing cheats for them are lethal. These people can easily transfer and apply this skillset to targeted application exploitation or weaponization. We've had the privilege of conversing with some truly special and gifted young people. Unfortunately, we are not privy with this community in totality, but we wanted to take this moment to express our gratitude to people such as @daaximus, @JustasMasiulis, and @namazso. We have witnessed these individuals make considerable contributions to recent trendy research topics and, in our opinion, have been given insufficient credit for their work. Very few people seem to realize these people have been core contributors to recently re-discovered (or newly announced?) process injection techniques. Additionally, Namazso is in essence the primary person who produced code and information on the recent trend of stack spoofing. Much love and respect to these people. We see you. We hope others do too. 🫡
English
43
109
1.1K
71.8K
Dick Reverse retweetledi
Tavis Ormandy
Tavis Ormandy@taviso·
This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags though... like what's up with the DEI stuff, and who says "stack trace dump"? Let's take a closer look... 🧵1/n
Tavis Ormandy tweet media
English
245
3.1K
15.5K
3.3M