Vangelis tix Stykas

5.7K posts

Vangelis tix Stykas banner
Vangelis tix Stykas

Vangelis tix Stykas

@evstykas

Father of two sons and ARIS fan. Named NOT A UNICORN!🦄 IDOR as a service. @_ifigeneia husband @atroposai jack of all trades Never ethical , mostly legal...

Thessaloniki Katılım Aralık 2009
393 Takip Edilen3.1K Takipçiler
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
"kids as a service" wardriving fleet was not on my 2026 bingo card. Children don't know. the parents don't know. the WiFi owners don't know. but the server knows...
English
0
0
1
239
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
@TurvSec I’ve spent (not wasted) thousands of hours on td and hero Defense and still play it from time t time. Especially X hero Defense
English
0
0
1
12
Luke Turvey
Luke Turvey@TurvSec·
@evstykas Struggle to remember the names but this i do remember!
English
1
0
0
17
Gi7w0rm
Gi7w0rm@Gi7w0rm·
An apparently Chinese Mobile Game heavily marketed in Europe casually asking me if I am a Government employee during a "What do you think about our game" survey...
GIF
English
5
7
77
4.2K
Gi7w0rm
Gi7w0rm@Gi7w0rm·
To a specific threatactor out there: Don't attempt to rely on technology you do not understand yourself. I will annoy you now 😈
GIF
English
5
1
25
2.3K
L0Psec
L0Psec@L0Psec·
More of these stealers shared by @malwrhunterteam :) XOR, system(), popen(), etc. Low detections on VT. Can be time consuming to decode. Both delivered via DMG and named Application\.app, which is weird. Also potentially interesting entitlements.
L0Psec tweet mediaL0Psec tweet media
English
2
7
58
7.4K
Luke Turvey
Luke Turvey@TurvSec·
@hetmehtaa There's some good ways to make money in infosec: ✅YouTube ad revenue ✅Infosec Twitter X revenue ✅Freelance Consulting ✅Building tools for donations ✅Paid speaking at cons/podcasts/whatever
English
1
0
23
2.3K
Het Mehta
Het Mehta@hetmehtaa·
What are the ways people make money in cybersecurity? Apart from bug bounty and courses.
English
28
7
152
21.9K
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
So I guess . "From url to APT wipe in less than 10 minutes!". YEAY ME!
GIF
English
0
1
3
232
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
3 minutes and a chatgpted script later we are as good as new! All deleted and clean!
Vangelis tix Stykas tweet media
English
1
0
1
246
Vangelis tix Stykas
Vangelis tix Stykas@evstykas·
Iran: blocks the internet Someone: accidentally becomes the sole operator of their C2 infrastructure. FUCK..
English
0
0
5
530
vx-underground
vx-underground@vxunderground·
Today ALPHV ransomware group (who swears they've never rebranded) informed me they've made a new ransomware group with a new and cool and badass name. I learned a few things. 1. ALPHV follows me on social media. They pay attention to my posts (including kitty cat pictures). 2. ALPHV informed me that they're no longer going to use TOR for ransomware leaks or negotiations because "the FBI can fuck it". Instead everything they do will be stored on the blockchain. Using the blockchain for malware, and malware accessories, isn't a new malware concept, however it is a relatively ... rare ... or more exotic TTP. If my memory serves me correctly (which it rarely does), the North Korean government has used cryptocurrency blockchains for malware delivery mechanisms and C2 persistence. They told me they'll be using ICP (Internet Computer Protocol) blockchain. I initially thought they meant "Insane Clown Posse" blockchain. For a brief moment in time I thought the Juggalos were getting involved in ransomware. I'm not a cryptocurrency nerd, but they said they use ICP blockchain because ICP can "run smartcontract on server". I have no idea what this means. What does all of this mean? I don't know. I've been out of the loop on cybercrime TMZ.
English
36
48
642
56.7K