Gabriel

3.2K posts

Gabriel banner
Gabriel

Gabriel

@_theVIVI

Security Engineer | Gamer

Nairobi, Kenya Katılım Nisan 2013
399 Takip Edilen1.3K Takipçiler
Gabriel retweetledi
NASA
NASA@NASA·
Welcome home Reid, Victor, Christina, and Jeremy! 🫶 The Artemis II astronauts have splashed down at 8:07pm ET (0007 UTC April 11), bringing their historic 10-day mission around the Moon to an end.
English
6.7K
107.1K
384.9K
75.5M
Gabriel retweetledi
vx-underground
vx-underground@vxunderground·
Mr. Titus Tech is correct. cpuid-dot-com is indeed delivering malware right now. As I began poking this with I stick I discovered this is not your typical run-of-the-mill malware. This malware is deeply trojanized, distributes from a compromised domain (cpuid-dot-com), performs file masquerading, is multi-staged, operates (almost) entirely in-memory, and uses some interesting methods to evade EDRs and/or AVs such as proxying NTDLL functionality from a .NET assembly. The C2 domain present in one of the binaries is a clear IoC. This is the same Threat Group who was masquerading FileZilla in early March, 2026. They've been busy.
vx-underground tweet media
Chris Titus Tech@christitustech

HWInfo and CPU-Z both compromised. Millions about to be PWNED! CPU Z: hybrid-analysis.com/sample/eff5ece… HW Monitor: hybrid-analysis.com/sample/4968501…

English
124
997
8K
1.6M
Gabriel retweetledi
incursion
incursion@Incursi0n·
Releasing GodPotatoBOF: Cobalt Strike BOF used to perform privilege escalation by exploiting the SeImpersonate privilege. OPSEC safe alternative to the .NET version. Based on the original GodPotato PoC by BeichenDream. github.com/incursi0n/GodP…
English
1
87
294
14.1K
Gabriel retweetledi
The White House
The White House@WhiteHouse·
THE ARTEMIS II ECLIPSE. April 6, 2026. Totality, beyond Earth. From lunar orbit, the Moon eclipses the Sun, revealing a view few in human history have ever witnessed. Photo: NASA
The White House tweet media
English
2K
15.1K
81.5K
5.6M
Gabriel retweetledi
NASA Artemis
NASA Artemis@NASAArtemis·
Earthset. The Artemis II crew captured this view of an Earthset on April 6, 2026, as they flew around the Moon. The image is reminiscent of the iconic Earthrise image taken by astronaut Bill Anders 58 years earlier as the Apollo 8 crew flew around the Moon.
NASA Artemis tweet media
English
992
27.4K
117.4K
7.7M
Gabriel retweetledi
Progress Bar 2026
Progress Bar 2026@ProgressBar202_·
2026 is 25% complete.
Progress Bar 2026 tweet media
English
198
4.1K
18K
873.7K
Gabriel retweetledi
Kuba Gretzky
Kuba Gretzky@mrgretzky·
Today is another package-lock.json appreciation day! - Make sure you always commit your project with the package-lock.json file. It is the ONLY version locking enforcement mechanism. - Use npm ci instead of npm install. The first one will work ONLY if package-lock.json exists. - If you need to update or pull new packages, use the --min-release-age flag (available since npm v11.10.0) to make sure you only install updates, which are at least 7 days old: npm install --min-release-age=7 Or hardcode this setting into your .npmrc file: min-release-age=7 There will be more malicious updates to popular npm packages in the future, driven by supply chain attacks. It's just the beginning. Thankfully, they will be caught in the first 24 hours. The npm ecosystem is broken by design. Adapt and act accordingly. Stay safe out there!
Kuba Gretzky tweet media
English
16
115
1K
66.4K
Gabriel retweetledi
mthcht
mthcht@mthcht2·
LOLEXFIL Living off the land Data Exfiltration method lolexfil.github.io
English
3
137
505
54.2K
Gabriel retweetledi
Matt
Matt@muthmsir·
ZeroTrust Workshop is now available on the web instead of in an Excel sheet. Last week, Microsoft announced the updated, 🚀brand new ZeroTrust Workshop. Most of us used the Excel sheet with our customers. We hoped to see this Excel sheet on the web, like the ZeroTrust Assessment. Now, I just want to give a big thanks to ✨Tarek Dawoud and @merill . Of course, there are many great people behind this, but unfortunately, I do not know their names. Once you complete a few of them, you'll see the score and how much is left to meet the ZeroTrust. Report before you complete anything Try it 👉 zerotrust.microsoft.com
Matt tweet mediaMatt tweet mediaMatt tweet mediaMatt tweet media
English
6
59
307
31.7K
Gabriel retweetledi
Alex Neff
Alex Neff@al3x_n3ff·
New NetExec module: mssql_cbt🔥 Relaying to MSSQL can be a hidden gem when you are out of options. The only protection against relaying to MSSQL is to enforce Channel Binding Tokens (CBT). Thanks to @Defte_, NetExec now has a module that checks whether this CBT is required.
Alex Neff tweet media
Aurélien Chalot@Defte_

Following the blogpost about implementing the Channel Binding token for TDS.py on Impacket (sensepost.com/blog/2025/a-jo…), here is the module you can use to check whether or not CBT is required on MSSQL databases via NetExec github.com/Pennyw0rth/Net… 🔥🔥

English
0
60
251
21.5K
Gabriel retweetledi
Progress Bar 2026
Progress Bar 2026@ProgressBar202_·
2026 is 22% complete.
Progress Bar 2026 tweet media
English
75
1.3K
6.7K
416K
Gabriel retweetledi
EZ
EZ@IAMERICAbooted·
Reduce your Intune Admins and use intune rbac and restricted admin units. Segregate device management into groups to decrease the blast radius. Treat Intune Admins like Global Admins. Require PIM with approvals. I've been saying this since before it was popular. As unpopular as this may sound right now, Microsoft is not to blame. They wrote about how to do all this in their documentation, but nobody does it. You have to keep in mind that it could have been a Global Admin too. In that case, the situation is even more dire. The vast majority of orgs are still hybrid. If the compromise was of the on-prem AD, not much you can do because you can pivot to an Intune Admin's device and use the APIs. This is why your EDR should be throwing high alerts when admin machines stop checking in and you should validate visibility on those machines. Managing admin machines is really really hard. Admins write code, run scripts, and look like they are compromised all the time when they're not.
Bert-Jan 🛡️@BertJanCyber

The Stryker Intune Remote Wipe incidents highlight that detection & response capabilities should extend beyond the attack vectors often published. The destruction of services should be detected if it exceeds a certain threshold within a sliding window. More in 🧵

English
9
37
163
31.3K
Gabriel retweetledi
EZ
EZ@IAMERICAbooted·
If a Global Admin gets compromised, it should be treated like a scorched earth scenario. The possibilities for backdoor are endless, especially if they disabled the audit logs.
English
7
14
117
10K
Gabriel retweetledi
John Hammond
John Hammond@_JohnHammond·
GraphSpy: A Hacker's Tooling Deep Dive, video demos with the creator @RedByte1337! 🤩 Keanu shows me the wild things you can do for post-exploitation in Entra ID -- even adding a physical security key for persistence and a ton of other tricks 🤯 Video: youtu.be/qEtoKC32UoE
YouTube video
YouTube
John Hammond tweet media
English
6
68
396
53K
Gabriel retweetledi
Justin Skycak
Justin Skycak@justinskycak·
When you "hit a wall" in something you are trying to learn, it's typically just a massive debt of unlearned prerequisites that are finally being called due.
English
69
1.3K
15.1K
246.3K
Gabriel retweetledi
Dr Kareem Carr
Dr Kareem Carr@kareem_carr·
There's a toxic culture coming out of the AI industry that keeps trying to get us not to think. The message is everywhere. Don’t read the code, just vibe-code. Don’t try to understand all the text, just let AI summarize it. Don’t bother educating yourself, it’s too late. Don’t worry about the errors. Trust that everything will be fixed in the next version. The theme is the same. Don’t think too hard. Just keep swallowing the slop.
English
386
2.1K
9.4K
360.9K