Sn0rkY

3.1K posts

Sn0rkY banner
Sn0rkY

Sn0rkY

@_Sn0rkY

Red Team for real, Security researcher, VoIP hacker, Ultra-trailer, Ambassador of Happiness and Healthy Living

Metaverse Katılım Nisan 2010
1.1K Takip Edilen2.3K Takipçiler
Adrián Puente Z.
Speaking at @BSidesSF 2026 Sunday 4:10pm PDT AMC Theatre 10! From Noise to Notes: Orchestrating SAST with Developers through AI-Driven Remediation Lessons from rolling out SAST: cut noise, rebuild trust, measure adoption, use AI (Vibe Security Patching) to remediate findings.
English
1
0
4
32
Matthias Kaiser
Matthias Kaiser@matthias_kaiser·
This week is my last week at my current employer. The last few months were quite intense, so after 18 months, I finally made the decision to start working as an independent vulnerability researcher. I wish the company all the best and speedy recovery. 1/2
English
14
3
149
13.8K
Sn0rkY retweetledi
Billy Ellis
Billy Ellis@bellis1000·
I infected my iPhone with the ‘Coruna’ spyware. Here’s what I found. youtu.be/XQvZ2mLnZVI
YouTube video
YouTube
English
11
138
787
196.1K
Sn0rkY
Sn0rkY@_Sn0rkY·
@theevilbit Excellent 🤩 good luck and keep us posted on your progress
English
1
0
1
78
Csaba Fitzl
Csaba Fitzl@theevilbit·
After long time planning, last week I have started my UIMLA International Mountain Leader training, which will take minimum of 2 years. I will be around IT for long time, but I eventually plan to take people to the mountains as well. IFMGA/UIAGM (guides) and UIMLA (leaders) are the only two globally recognized, international certifications for mountain professionals. IFMGA covers technical, glacial, and high-altitude mountaineering, whereas UIMLA focuses on trekking, hiking, and snowshoeing in non-technical terrain.
Csaba Fitzl tweet media
English
5
0
14
1.5K
Sn0rkY
Sn0rkY@_Sn0rkY·
@matrosov All the best with your next gig Alex !
English
0
0
2
147
Alex Matrosov
Alex Matrosov@matrosov·
To the Binarly Board, Team, Investors, Partners, and Community: When I started Binarly, we weren’t trying to build another “security” company. We built Binarly to solve a problem that the industry kept ignoring: You can’t secure what you can’t see, and in the software supply chain, too much is invisible. Over the last five years, we built something real. We advanced the state of the art in program analysis, accelerated real-world AI adoption, and raised the bar for vulnerability research. We brought supply-chain security out of theory and into production. We shipped the most advanced product in the market, and we launched open-source projects that have helped raise the bar for the entire industry. Most importantly, we built a team that refuses to accept limits, people who keep going after the hard problems because they matter. That day is now. Not because my passion is gone; far from it. But because it’s time for me to pursue new ventures and contribute in new ways. I’m incredibly proud of what we’ve built, and I’m confident in what comes next. Binarly is entering its next phase, and it deserves leadership that wakes up every morning thinking about the mission: scaling this platform, always improving customer service, and winning the market. To our team: You are the reason Binarly exists and succeeds. To our investors: Thank you for your conviction, your patience, and your partnership, especially when the work was hard and the outcome isn’t guaranteed. To our customers and partners: Thank you for trusting us with mission-critical risk, for pushing us to be better, and for placing your trust in Binarly when the stakes were highest. As a continuing Board member, I will remain deeply connected to Binarly and its mission, and I’ll be cheering for this team every step of the way. With gratitude for the journey, and full confidence in the road ahead.
Alex Matrosov tweet media
English
21
6
87
11.3K
Sn0rkY retweetledi
joernchen
joernchen@joernchen·
Lands of Packets TTL exceeded. I would like to collect texts from the scene about FX in his memory. A collection of obituaries that will then be posted on phenoelit.de. If anyone would like to contribute, please contact me. Mail: joernchen@phenoelit.de Signal: jrn.07
English
1
26
38
6K
Sn0rkY retweetledi
Ray Maker
Ray Maker@dcrainmakerblog·
An interesting wrap-up presentation from the security researcher who found the COROS watch security vulnerabilities last year. Worth a watch if you're into geekery: youtube.com/watch?v=WmY9XB…
YouTube video
YouTube
Ray Maker tweet media
English
0
4
19
4.8K
Sn0rkY retweetledi
Thijs Xhaflaire
Thijs Xhaflaire@txhaflaire·
Is ESLogger or Mac Monitor your friend for dynamic malware analysis on macOS? Then i've got something that might come to use! An browser based ES/Mac Monitor log analyzer with a lot of neat features like story timelines, Sigma rule matching, an in-depth process tree analyzer and much more and the neat thing is, nothing is uploaded to any backend! I'm looking for feedback! Take a look at es.decompiler.dev #macos #malware #reverseengineering #re #ThreatHunting #dfir
Thijs Xhaflaire tweet mediaThijs Xhaflaire tweet mediaThijs Xhaflaire tweet mediaThijs Xhaflaire tweet media
English
4
12
48
6.5K
Sn0rkY retweetledi
Claude
Claude@claudeai·
Introducing Claude Code Security, now in limited research preview. It scans codebases for vulnerabilities and suggests targeted software patches for human review, allowing teams to find and fix issues that traditional tools often miss. Learn more: anthropic.com/news/claude-co…
English
1.9K
5.8K
50K
26M
Sn0rkY retweetledi
AISecHub
AISecHub@AISecHub·
Co-RedTeam - Orchestrated Security Discovery and Exploitation with LLM Agents - arxiv.org/pdf/2602.02164 by @Google We propose Co-RedTeam, a security-aware multi-agent framework for automatic software vulnerability discovery and exploitation, explicitly designed to overcome core limitations of existing LLM-based security systems, namely brittle single-shot reasoning, lack of execution-grounded validation, and the inability to learn from prior attacks. Inspired by how human security experts conduct red teaming, Co -RedTeam tightly integrates four capabilities essential for realistic cybersecurity tasks: security grounding, code-aware analysis, execution-driven reasoning, and experience accumulation. Authors: Pengfei He, Ash Fox, Lesly Miculicich, @stfn42, Daniel Fabian, Burak Gokturk, @tangjiliang, @chl260, @tomaspfister, Long T. Le - @michiganstateu #AISecurity #LLMAgents #RedTeaming #VulnerabilityResearch #AppSec #SecureCoding #AIForSecurity #OffensiveSecurity #AgenticAI #CybersecurityResearch #CodeAuditing #ExploitDevelopment
AISecHub tweet media
English
6
51
198
14.2K
Sn0rkY
Sn0rkY@_Sn0rkY·
@nono2357 On the “Bitcoin shop types” it will be nice to filter per country and have the map visualization 🙏
English
1
0
1
87
Sn0rkY retweetledi
Nadim Kobeissi
Nadim Kobeissi@kaepora·
Pleased to announce that I'm launching Magicall, end-to-end encrypted videoconferencing in the browser. Try it out: magicall.online
English
6
8
40
5.1K
Sn0rkY retweetledi
🏴‍☠️ The Pirate 🏴‍☠️
Mi serviva un tool per vedere tutto quello che parte in automatico sul Mac. Per Windows c'è Autoruns, per Mac non ho trovato nulla che facesse quello che volevo io. Quindi, come la solito... me lo sono scritto. Metto qui, magari serve anche a voi. github.com/Pinperepette/M…
Italiano
28
37
272
28.7K