McSam

1.6K posts

McSam banner
McSam

McSam

@theMcSam

computerphile

core Katılım Nisan 2020
901 Takip Edilen473 Takipçiler
Rado RC1
Rado RC1@RabbitPro·
Inspired by tweet from our new YouTube subscriber I looked at our statistics. We have passed 2 million views and have over 65k subs. It’s impressive for me considering we only have 10 videos on our channel. My personal favourite is the DNS exploitation series. And yours?
Rado RC1 tweet media
English
6
7
64
6.4K
McSam retweetledi
Ryan Michael
Ryan Michael@ryanetornam·
🧑‍💻🔎From Logs to Insights: Bridging the Gap between AI and Security Operations ⭐️ Security teams often spend hours digging through alerts, logs, and vulnerabilities. What if you could just ask a question in plain English and get the answer instantly? I’ve built an AI agent that connects directly to Wazuh SIEM using the Model Context Protocol (MCP). This means you can chat with your security data in real time: “Show me critical vulnerabilities on web servers.” “Which agents are offline?” “Are we meeting PCI-DSS requirements?” Instead of running complex queries, you get clear, actionable answers—fast. The goal is simple: democratize AI for SOC teams, threat hunting, and SecOps. No more barriers between your data and your decisions. I believe this is a step towards making AI a real partner in everyday security operations. Would you add this to your SOC? #CyberSecurity #AI #SIEM #SecOps #ThreatHunting #Wazuh #SecurityOperations #SOC #InfoSec #ArtificialIntelligence #MCP #SecurityAutomation #CyberDefense #DemocratizingAI #NextGenSOC
Ryan Michael tweet mediaRyan Michael tweet mediaRyan Michael tweet media
English
1
3
7
771
Bug Bounty Village
Bug Bounty Village@BugBountyDEFCON·
To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. ✅ Comment BADGELIFE and retweet this post to enter. Additionally, pre-order a custom badge at shop.bugbountydefcon.com for a chance to win one of FIVE Annual VIP+ subscription to @hackthebox_eu. Purchasing a badge helps us run and fund the village. That's a total of TEN WINNERS! Winners will be picked on August 1st. Good luck! Note: Badges are pre-order only. Order online, pick up in village. No shipping. #BadgeLife #DEFCON33 #BugBounty
English
318
267
320
55.3K
McSam retweetledi
Byte Time Sessions
Byte Time Sessions@bytetimesession·
📢 BYTE TIME SESSIONS: BINARY EXPLOITATION WEBINAR 🎯 Topic: Bending the Bytes of Software — Basics of Binary Exploitation In the world of hacking, understanding software at the binary level is essential. (1/5)
Byte Time Sessions tweet media
English
1
3
5
400
Dr. John Umoru
Dr. John Umoru@johnumorujo·
Hi, I'm John Umoru, a medical doctor from Nigeria, and I just passed the OSCP from @offsectraining why is a doctor writing the OSCP, you may ask? well, if you followed the journey, you would understand better. A thread!...
Dr. John Umoru tweet media
English
58
71
595
54.5K
junior, III
junior, III@1bp7l_·
umm excuse me, Phillipa Bennett-Eghan?
English
10
0
24
3.1K
McSam
McSam@theMcSam·
@1bp7l_ @BLVCKPRINXE Ohh thought it was just a wordplay of the name Phillipa. Sorry oo, she’s Abena or Junior. ✋😂🤚
English
1
0
0
24
junior, III
junior, III@1bp7l_·
@BLVCKPRINXE @theMcSam chale he's ruining it, i hate the meaning of that name but that's what they used to call me in grade school. stopped responding to it because of it's meaning in ga or so
English
2
0
1
63
McSam
McSam@theMcSam·
To help others test the vulnerability in a controlled environment, I’ve included a setup script for Gogs: github.com/theMcSam/CVE-2… I hope it helps others better understand and validate this issue. (4/4)
English
0
0
1
124
McSam
McSam@theMcSam·
RCE in Gogs (CVE-2024-39930) CVE-2024-39930 is a Remote Code Execution vulnerability affecting the SSH server built into Gogs. While the Sonar's blog post explains the vulnerability well, no working exploit or guide to exploiting this vulnerability had been made public. (1/4)
English
2
1
6
312