December 25.26.27, 2025
December 25.26.27, 2025
Happy Holidays everyone!
Why is this running
GitHub - pranshuparmar/witr: Why is this running?
Why is this running? Contribute to pranshuparmar/witr development by creating an account on GitHub.
Looks like it might be an interesting security tool, as it automatically collects and displays parent lineage data about a process.
CPLDCOMTrigger: Load DLLs remotely into memory using DCOM to achieve command execution for lateral movement https://t.co/PSglChKMxC
— Haidar (@haider_kabibo) December 24, 2025
This work is outstanding!https://t.co/L0NkVnUftj
— Mark Ermolov (@_markel___) December 24, 2025
Founding is a stealth binary generator that weaponizes indirect syscalls, AMSI bypasses, and sandbox detection to create undetectable shellcode loaders.https://t.co/hxOtsruFTK pic.twitter.com/EweJUpW3a9
— Gray Hats (@the_yellow_fall) December 23, 2025
When BYD unveiled megawatt charging earlier this year, I called it “the other DeepSeek moment.” https://t.co/m4zJsmVZR8
— Kyle Chan (@kyleichan) December 23, 2025
MALLOC in C by @danluu is the best thing I have read about OS and low level code.
— kshitij vaze (@VazeKshitij) December 24, 2025
I beg you lot to take a look, and try this out. I don't care which OS you are on, get a VM if you have to, but do this one lads, you'll love it.https://t.co/J3sX66SF4W
The IISS has produced the most comprehensive open-source database currently available on Russian sabotage operations across Europe and its periphery. It captures the full spectrum of activity with physical effects: from sabotage on undersea cables to GPS blocking across multiple… pic.twitter.com/Plj5zO1ri4
— IISS News (@IISS_org) December 24, 2025
Technical details for a kernel UAF vulnerability I reported earlier (analysis + PoC).https://t.co/cxzYZapd63
— Maher Azzouzi (@maherazz2) December 23, 2025
Snitch is a modern, user-friendly command-line tool for inspecting network connections on Linux and macOS. It serves as a more visually appealing and intuitive alternative to traditional tools like ss or netstat, offering both an interactive terminal user interface (TUI) and… pic.twitter.com/08OAWSJvXw
— blackorbird (@blackorbird) December 23, 2025
Over the last year, I've secretly surveilled the Waymos alone at night, at some personal risk of injury. Enjoy this rare behind-the-scenes look at the strange goddess they worship, how their traffic flows, and most importantly ask yourself: who watches the Waymos?
— Vincent Woo (@fulligin) December 24, 2025
(I do) pic.twitter.com/alLzBRiV3I
“I am the Ghost of Christmas Future Imperfect Conditional” said the Spirit. “I bring news of what would have been going to happen, if you were not to have been going to change your ways.”
— Dr Helen Ingram (@drhingram) December 24, 2025
Since certain companies boast about wanting to rewrite their whole code, maybe it’s time to point the next generation of engineers towards this classic: https://t.co/kNbYSz0iYE (It‘s been 25 years. People seem to have forgotten.)
— Raphael Luba (@LubaRaphael) December 24, 2025
I came across this very cool tool to clean up your macOS environment: https://t.co/z1AS3gWXF8
— Pedro Piñera (@pepicrft) December 24, 2025
It consolidates features from CleanMyMac, AppCleaner, DaisyDisk, and iStat. Open source and gratis!
I remember seeing a post about how normalized AI in advertisements making the company look cheap will mean real art will start becoming the standard for brands to seem more luxurious and it's really happening https://t.co/aQMgiMQN5y
— Puri🤍 (@Purilly) December 23, 2025
— Gribanov ☢ ᓚᘏᗢ (@Gribanov) December 23, 2025
Always appreciate the nice use of llm VS vulnerabilities
— Giuseppe `N3mes1s` (@N3mes1s) December 24, 2025
Escaping the Guest: How Custom LLM Workflows Uncovered Critical VMSVGA Vulnerabilitieshttps://t.co/hW7rkDsajV
Saw a girl in a Franz Ferdinand t-shirt. She couldn't even name 3 other main causes of the outbreak of World War I
— Ross Sayers (@Sayers33) December 24, 2025
hopefully DoorDash will be the first major company incentivized to build out a reliable deepfake detector (very doable, though it will become a red queen race) and hopefully license out the technology https://t.co/1qlsTq7Yqv
— roon (@tszzl) December 27, 2025
A senior Google engineer just dropped a 424-page doc called Agentic Design Patterns.
— Dmitri Volkov (@DBVolkov) December 26, 2025
Every chapter is code-backed and covers the frontier of AI systems:
→ Prompt chaining, routing, memory
→ MCP & multi-agent coordination
→ Guardrails, reasoning, planning
This isn’t a blog… pic.twitter.com/iKBRzMvqY1
A downloadable PDF version is hosted on Google Drive here:https://t.co/qJjnVjnIr7
— Mike Doris (@MikeDoris) December 26, 2025
It's also mirrored on GitHub as a PDF here: https://t.co/FSZtMukr7shttps://t.co/0RqmT3T3oH
🛜 Pentesting Bluetooth: A few blogs on Hacking Bluetooth Low Energy
— Muqsit 𝕏 (@mqst_) December 25, 2025
1. https://t.co/nGlSkQBecs
2. https://t.co/eDT98wGGRz
3. https://t.co/h9BvPuPwZt
authors: @hacktricks_live / @attifyme pic.twitter.com/GJG5paa7IR
🐹 Building a GPT from scratch in Go.
— Viacheslav Biriukov (@brk0v) December 26, 2025
Fully commented, and following Andrej Karpathy’s legendary Neural Networks: Zero to Hero guide.
If you want to really understand transformers (not just use them), this repo is a great start:https://t.co/WiqOlcz9Ql#golang #go #gpt #llm pic.twitter.com/Petx5xAX7e
M
Add a comment: