nevdull

5.7K posts

nevdull

nevdull

@nevdull

earth Katılım Ekim 2007
52 Takip Edilen141 Takipçiler
nevdull retweetledi
Svetlana Lokhova
Svetlana Lokhova@RealSLokhova·
The Deep State groomed Jake Sullivan to become the next President. They arranged a marriage for a 40+ year old bachelor Sullivan to marry Goodlander, the money. The wedding took place in 2015, around the start of the presidential campaign. Hillary was going to be installed but the Sullivan-Goodlander dynasty was going to take over from the Clintons. That's why you have Bill Burns, Tony Blinken etc attending. To stop Donald Trump, Sullivan and Hillary, with the help of Obama, Soros, US and British intelligence devised the Clinton Plan to tie Donald Trump to Russian intelligence, aka Russiagate. President Trump won against all odds. Sullivan was devastated. So he, Soros, Obama and co plotted to take out President Trump. The conspiracy continues to this day. Maggie Goodlander is the ringleader of the Seditious Six.
Svetlana Lokhova tweet media
Alex Thompson@AlexThomp

Scoop: Nat Sec Action—the foreign policy hub for the left co-founded by Jake Sullivan and Ben Rhodes—is rebooting ahead of the 2028 Dem primary with a new director, and more. Nat Sec Action became a key source for staffing the Biden admin. axios.com/2026/05/03/dem…

English
193
3.3K
9.1K
707.3K
Kumashun🇯🇵🐻💎
Kumashun🇯🇵🐻💎@isfjcutebear·
Japan is planning to import 11 million brown third worlders by 2040 We are still early, everyone is asleep. What should we do?
English
1.2K
440
4K
71.2K
nevdull retweetledi
Squiblydoo
Squiblydoo@SquiblydooBlog·
The RansomISAC published regarding "Zhengzhou 403 Network Technology Co., Ltd.", a cert we reported in 2025 after it was used to sign CobaltStrike. Their investigation seemed like a wild adventure, check it out. ransom-isac.org/blog/dragonbre… 1/3
English
1
16
39
7.1K
nevdull retweetledi
Ben Hart
Ben Hart@BenHart_Freedom·
If both parties MAXXED OUT on gerrymandering, the House would end up with 262 Republicans to 173 Democrats -- according to leftist FiveThirtyEight. That's because Republicans control more state governments with multiple districts, and Democrat voters congregate in cities. This makes it easy-peazy to pack Dem voters into fewer districts. Time to play hardball. Let's do it . . . NOW!
Ben Hart tweet media
English
613
2.9K
15.2K
532K
nevdull retweetledi
Wall Street Apes
Wall Street Apes@WallStreetApes·
A White male says he has submitted over 300 job application, he can’t get a single call back So he tried an experiment, he updated his resume to have a common Indian last name ‘Singh’ He says he’s already gotten 3 callbacks This is discrimination based on race and it’s happening everywhere to White people
English
2.9K
20K
63.4K
1.8M
nevdull retweetledi
Palmetto State Armory
Palmetto State Armory@palmettoarmory·
The ATF just signed 34 rule changes. 8 are done. 26 are still proposed, which means they go to the Federal Register and the public gets to comment. Federal agencies are required to read those comments. Your voice matters here. We’ll post the links when they’re live. Watch for it. The Second Amendment is only as strong as the people willing to defend it.
English
77
619
4.1K
101.4K
nevdull retweetledi
Matt Johansen
Matt Johansen@mattjay·
He began by replicating Mythos findings with his specialized harness. Then went on to find more critical novel zero days in open source code that he can't share yet because they're not fixed. TL;DR - harnesses are where the magic is. provos.org/p/finding-zero…
English
10
81
494
41.2K
nevdull retweetledi
Matt Johansen
Matt Johansen@mattjay·
woah. Google is reducing their bug bounty payouts. stated reason is that AI tooling internally has gotten too good at the stuff they'd normally get bug reports for. They're incentivizing exploit PoCs over anything it seems since AI still struggles there.
Matt Johansen tweet media
English
7
23
136
16.4K
nevdull retweetledi
Matt Johansen
Matt Johansen@mattjay·
Reading @NielsProvos research of how he's finding zero days with pre-Mythos models (even Sonnet 4.6) This absolute legendary line buried in here about him replicating the Mythos OpenBSD bug. Meant a lot to him because ...he wrote the bug in 1998
Matt Johansen tweet media
English
3
32
190
14.8K
nevdull retweetledi
Andrew Morris (afk)
Andrew Morris (afk)@Andrew___Morris·
Howdy folks! Taking a break from my twitter break to let yall know that we released a new @GreyNoiseIO product yesterday. It's called Project Swarm. We've been quietly not-so-quietly working on it for a few years. You can buy it now. It costs $1. There are lots of vulnerabilities on edge-facing apps. To catch in-the-wild exploitation of them, we @ GreyNoise run sensors on the internet. New AI models means more vulnerabilities being identified and exploited, and FASTER. Long term, software and hardware will probably get better, but in the meantime we're gonna have to deal with A LOT of vulnerabilities. At GreyNoise, the sensors we run are basically honeypots- we bait attackers to scan and exploit them which enables us to learn where the attackers are, which vulnerabilities they are exploiting, what it drops, and what it looks like on the wire. From ~2020-now it took us years to build up our fleet. Now anyone can use our new product to deploy their own sensors on their own networks, or an entire fleet of any size, in a day. You can rip back the data and do whatever you want with it. You can resell it, put it into your product, or just stare at it- whatever you want! On our side, we aggregate the data and pour it into a community dataset that everyone shares. As more people join, the data gets bigger and better. Couple neat features: - Sensor deployment is a single bash command on any modern linux distro that supports iptables and wireguard. - Sensors and vulnerable software (profiles) are abstracted into different logical concepts, which means the "what" and "where" are different things, and the sensor is not constrained by the compute required to run the vulnerable software. Also, no matter how hacked the profile (honeypot) gets, it can't touch your host sensor or the rest of your network. - Sensors can run fake honeypots, real software, or even real hardware (bridged with a raspberry pi) like old crappy routers and modems (or expensive firewalls and VPN gateways 👀) - You can create dynamic blocklists that block IPs sourced from your own sensors in real time, so if a remote IP address *looks at your network* the wrong way, you block them instantly. - All the PCAP data is available to you in a gorgeous and intuitive interface at near real time and fully enriched against all of our (thousands of) rules. We're working on the host metadata (malware, syscalls, host behaviors) as well, but this will come later. - If we don't tag a CVE that's interesting to you, you can write a Suricata rule to tag it yourself once and your data gets tagged with it in real time forever. - You can instantly download PCAPs of any exploits that hit your sensors. - If you don't want your data shared with the community dataset, you can talk to our team and we'll work out rights to make it private. Check it out! There's a lot of moving pieces to make this work and we expect bugs, but it's available right now. Join the fight! greynoise.io/project-swarm
Andrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet mediaAndrew Morris (afk) tweet media
English
13
82
350
34.5K
nevdull
nevdull@nevdull·
@_piccone > HIGH SLOT CAM YORK > they score. > oh so tasty.
English
0
0
0
114
nevdull retweetledi
grsecurity
grsecurity@grsecurity·
Creating a separate post so more people see this: the mitigation recommended by Theori.io for copy.fail *WILL NOT WORK* for any RHEL or RHEL-derived distro, including CentOS, Fedora, Oracle, and Alma as the vulnerable code is built-in.
English
4
59
152
38.8K
nevdull retweetledi
Brad Spengler
Brad Spengler@spendergrsec·
Realize that when you report vulnerabilities to security@kernel.org, it goes to people who do not coordinate with distros, don't care what happens to distros. I have been telling people this for years. This is your "bugs are bugs" mantra in action, seem stupid yet?
English
2
19
128
11.8K
nevdull retweetledi
blasty
blasty@bl4sty·
to celebrate the release of Copy Fail and the professional way the embargo and disclosure was handled by all involved parties i have sacrificed my lunchbreak to do a quick C port (with aarch64 support and some other small things) of the original PoC gist.github.com/blasty/d7b5d05…
English
8
61
296
20.6K
nevdull retweetledi
rootsecdev
rootsecdev@rootsecdev·
I too woke up and choose violence today as the fail-copy POC dropped. Made a clean exploit including fixing the UID post exploitation without rebooting the target server. Smoke those CTF’s in hack the box. github.com/rootsecdev/cve…
English
4
117
559
32.6K