Digit Oktavianto

19.4K posts

Digit Oktavianto

Digit Oktavianto

@digitoktav

I'm Not Anti Social, I'm Just Not User Friendly

behind you Katılım Temmuz 2009
2.8K Takip Edilen768 Takipçiler
Digit Oktavianto retweetledi
mthcht
mthcht@mthcht2·
👁️ LOLC2 Collection of C2 frameworks abusing legitimate services to evade detection Major update: new projects tested, enriched data, and deeper insights. site: lolc2.github.io github: github.com/lolc2/lolc2.gi…
English
0
89
287
26.9K
Digit Oktavianto retweetledi
vx-underground
vx-underground@vxunderground·
I don't know what they're putting in the water, but these anime profile-picture nerds are cookin' .@es3n1n reverse engineered Windows Security Center service and found how to interop with it. This includes disabling it and being a memester See attached post for details
vx-underground tweet media
English
12
160
2.3K
97.3K
Digit Oktavianto retweetledi
Frank Boldewin
Frank Boldewin@r3c0nst·
Slides, code and #YARA rules from the workshop I recently teached internally covering various aspects including C and Python API usage, tips & tricks when developing rules and 5 challenges and its solutions. Thanks @wxs for reviewing the slides. #DFIR github.com/fboldewin/YARA…
Frank Boldewin tweet media
English
3
144
335
33.3K
Digit Oktavianto retweetledi
SwiftOnSecurity
SwiftOnSecurity@SwiftOnSecurity·
When the company gets ransomwared but you installed Linux on your company laptop
English
42
475
4.9K
758.3K
Digit Oktavianto retweetledi
TxtdariHI
TxtdariHI@TxtdariHI·
Wakanda 😭😭😭
Indonesia
168
1.7K
4.3K
358.9K
Digit Oktavianto retweetledi
Kostas
Kostas@Kostastsale·
Today, me and @ateixei are releasing the EDR Telemetry project. This project aims to compare and evaluate the telemetry of various EDR products. ✅Introductory blog post: t.ly/9Ia3 ✅GitHub Repo: github.com/tsale/EDR-Tele… ✅Comparison Table: t.ly/HMht
English
45
329
810
169.2K
Fusion Intelligence Center @ StealthMole
DarkTracer platform has enhanced its location-based intelligence search feature. Users can now search for various information within a specific radius from a particular location. Here's an example of investigating credentials leaked from users infected with stealer malware within 1km radius from a certain location.
Fusion Intelligence Center @ StealthMole tweet media
English
5
42
148
48.1K
Digit Oktavianto retweetledi
Morning Brew ☕️
Morning Brew ☕️@MorningBrew·
Wtf happened with Silicon Valley Bank ft. @dhtoomey
English
64
1.1K
4.6K
644.6K
Digit Oktavianto retweetledi
PentesterLab
PentesterLab@PentesterLab·
Time for another giveaway! We are going to send a t-shirt and a few goodies to one person who follows @PentesterLab and retweets this tweet!! And we are going to give a 12-month voucher to someone who follows @PentesterLab and likes this tweet!!
English
114
844
1.4K
98.5K
Cerbero Labs
Cerbero Labs@cprofiler·
In our upcoming PowerShell beautifier package we have also implemented automatic naming of variables.
Cerbero Labs tweet media
English
1
11
14
2.4K
Digit Oktavianto retweetledi
4n6lady
4n6lady@4n6lady·
⭐️GIVEAWAY!⭐️ I'm giving away 10 digital copies of Digital Forensics and Incident Response, 3rd Edition by @GERARDJOHANSEN @PacktPublishing Winners will be announced Friday, @ 12pm EST 🥳 Enter by liking, sharing, and commenting 😊
4n6lady tweet media
English
858
974
2.7K
225.3K
Digit Oktavianto retweetledi
Joshua Wright
Joshua Wright@joswr1ght·
My presentation on Cloud Scanning for Vulnerability Discovery is up on YouTube! youtube.com/watch?v=Izy9AP… Grab the companion article and notes PDF in the links.
YouTube video
YouTube
English
4
31
103
18.6K