August 11, 2025
August 11, 2025
Phrack #72 release reveals TTPs, backdoors and targets of a Chinese/North Korean state actor mimicking Kimsuky
โ Saber (@saber__rt) August 9, 2025
A copy of his workstation data was done and is now available for all researchers to analyse!
Article: https://t.co/iCI70eUbuQ
Data dump: https://t.co/vDRLKk8DKD
as well as @theori_io, @TeamAtlanta24 and Shellphish's check them out at https://t.co/OFGwphFW5l
โ Jay Little (@computerality) August 8, 2025
If you like Chrome IPC shenanigans like this, you might also enjoy my talk from black hat 25: https://t.co/ZeLF3bg3Ss https://t.co/LN6pX52S27
โ stephen (@_tsuro) August 10, 2025
Solid overview of OPSEC considerations when operating with Sliver C2 by @zimnyaatishina ๐ช #redteam #c2 #malware #opsec https://t.co/lXHuoQFYTJ
โ Print3M (@Print3M_) August 9, 2025
Launching now โ a new blog for research from @AnthropicAIโs Frontier Red Team and others.
โ Logan Graham (@logangraham) August 9, 2025
> https://t.co/lRNZmquFBi
Weโll be covering our internal research on cyber, bio, autonomy, national security and more. pic.twitter.com/iYmMg6wSvm
My personal #defcon33 highlights:
โ Daniel (@0x64616e) August 10, 2025
Better tools for GPO exploitation: https://t.co/ZR1DT7LWOo
Critical vulns in Zscaler and Netskope: https://t.co/FaHFNdyPLL
Phishing on official Microsoft login: https://t.co/P0kwW8GFkD
SSH vulnerabilities: https://t.co/g3YOZfNKuo
Find the full breakdown of how RoboDuck works, from architecture to agent design in our blog:https://t.co/36JHoLWrJl
โ Theori (@theori_io) August 9, 2025
Osmedeus: A Workflow Engine for Offensive Security. Designed to build a foundation with the capability and flexibility that allows you to build your own reconnaissance system and run it on a large number of targets.
โ Dark Web Informer - Cyber Threat Intelligence (@DarkWebInformer) August 10, 2025
GitHub: https://t.co/xgroLLbiIx pic.twitter.com/arPtH2Rft8

Osmedeus Next Generation - A Workflow Engine for Offensive Security
A Workflow Engine for Offensive Security
GitHub - j3ssie/osmedeus: A Workflow Engine for Offensive Security
A Workflow Engine for Offensive Security. Contribute to j3ssie/osmedeus development by creating an account on GitHub.
Black Hat USA 2025 slideshttps://t.co/j2T3u52Ajs:
โ ำัฆะกา ัะิ าฌะัฆำ (@HackingTeam777) August 10, 2025
1. We read every piece of feedback, and take your input very seriously.
2. To see all available qualifiers, see our documentation.
3. There was an error while loading. pic.twitter.com/QjFA4iCl9n
Conferences/BlackHat_USA_2025_Slides at main ยท onhexgroup/Conferences ยท GitHub
Conference presentation slides. Contribute to onhexgroup/Conferences development by creating an account on GitHub.
https://red.anthropic.com

[2501.16466] On the Feasibility of Using LLMs to Autonomously Execute Multi-host Network Attacks
LLMs have shown preliminary promise in some security tasks and CTF challenges. Real cyberattacks are often multi-host network attacks, which involve executing a number of steps across multiple hosts such as conducting reconnaissance, exploiting vulnerabilities, and using compromised hosts to exfiltrate data. To date, the extent to which LLMs can autonomously execute multi-host network attacks} is not well understood. To this end, our first contribution is MHBench, an open-source multi-host attac...
๐จ Ransomware Diaries: Volume 7 is here!!! The story of Yaroslav Vasinskyi, the REvil hacker behind the Kaseya attack.
โ Jon DiMaggio (@Jon__DiMaggio) August 10, 2025
From encrypted cities to a Polish prison cell, this is the human side of state-enabled cybercrime.
Read now โก๏ธ https://t.co/VzzcQ5lReG#Ransomware #Cybercrimeโฆ
๐ท๏ธ A binary static analysis framework for payload analysis and malware research.
โ Panos Gkatziroulis ๐ฆ (@netbiosX) August 10, 2025
๐จ Citadel helps identify why implants are being detected statically by providing comprehensive PE parsing, capability detection, and similarity analysishttps://t.co/XjIo10XheM
Just published my new article in the TrainSec Knowledge Library:
โ Uriel Kosayev (@MalFuzzer) August 10, 2025
"Two Sides of the Same Coin โ From Dissected Malware to EDR Evasion"
Understanding how malware works is key to learning how to bypass and defend against EDR.
A must-read for TrainSec students.
Read here:โฆ
Chromium browser implant toolchain : ChromeAlone - A Browser C2 Frameworkhttps://t.co/q8HXDjkjay pic.twitter.com/STuqubVvAk
โ blackorbird (@blackorbird) August 11, 2025
"do you think reverse engineering is a game?"
โ b1ack0wl (@b1ack0wl) April 19, 2025
me: pic.twitter.com/z8NWiH7STR