September 13-14,
September 13-14,
There's a sick linenoise article by @iximeow in @phrack 71 called "Learning An ISA By Force Of Will", where ixi goes from unknown binary blob, to manual instruction decoding, to figuring out control flow, and gives a critique of the RE'd ISA.https://t.co/LK4R6e6lUI https://t.co/AsPvKJKmag
— Battle Programmer Yuu (@netspooky) September 13, 2025
Since Kerberoast/Kerberoasting is in the news, here's the article on how to setup a Kerberoast honeypot to detect Kerberoasting activity: https://t.co/nssQu12jwk
— Sean Metcalf (@PyroTek3) September 12, 2025
And this article describes some best practices for setting up an Active Directory honeypot account:…
The Great Firewall of China (GFW) today experienced the largest internal document leak in its history. More than 500GB of source code, work logs, and internal communications have been exposed, revealing details about the development and operation of the GFW.
— gfw.report (@gfw_report) September 13, 2025
The leak originated… pic.twitter.com/DADdDtKZ7w
Brilliant bit of research into the ugly world of parameter pollution and the utter shit show that is the WAF industry: https://t.co/TNUqoCPkqD
— Daniel Cuthbert (@dcuthbert) September 12, 2025
kudos to the @ethiack team here.
I totally forgot to upload my Defcon33 Workshop content...
— OtterHacker (@OtterHacker) September 11, 2025
If you want to learn and play with Instrumentation Callback on Windows, weaponize the Nirvana Debugging feature for syscall hijacking, process injection or sleep obfuscation, everything is here:https://t.co/hdGwIv2KgB
Deep dive into building an EDR kernel driver: from callbacks to user-mode orchestration#WindowsInternals #KernelDriver #EDRhttps://t.co/7apGIY9mIC pic.twitter.com/EkKiC3nmTo
— Raashid Bhat (@raashidbhatt) September 11, 2025
It’s true that NATO would struggle to intercept mass drone/missile salvos in a sustainable & economical way. But that doesn’t mean it’s helpless. In a state of war, it would also go after the launchers at source. Don’t conflate peacetime dilemmas with wartime constraints. https://t.co/dsY7B1fR1V
— Shashank Joshi (@shashj) September 12, 2025
Great writeup from @Intel471Inc!
— Phrack Zine (@phrack) September 12, 2025
https://t.co/0oXThWlGUm
Bugs disclosed in the Shopify program are a goldmine for learning about access control bugs.
— Behi (@Behi_Sec) September 12, 2025
Dive into the reports, study the techniques, and level up your skills:https://t.co/n3PSBSHAnx
Honestly the impact of this incident is really bloody bad https://t.co/I2q8QaFwJV
— mRr3b00t (@UK_Daniel_Card) September 12, 2025
A resource containing all the tools each ransomware gangs useshttps://t.co/6lSLaGOqCD
— Panos Gkatziroulis 🦄 (@netbiosX) September 12, 2025
Multimap
— Cyber Detective💙💛 (@cyb_detective) September 12, 2025
An online tool for comparing online maps side by side. It includes dozens of different maps, including the most up-to-date and well-known ones (Bing, OpenStreetMap), as well as local and historical maps for different countries.https://t.co/JOqunyYQ9n#geoint pic.twitter.com/XOVpWSkyKF
KIM KITSURAGI - "What is it, detective? Can you make it out?"
— yoshimi red (@nise_yoshimi) September 12, 2025
BULLET - "if you read this you are gay lmao"
1. "It, um, doesn't say anything."
2. "Transgender ideology. My old foe."
3. [Espirit de Corps - Medium 10] "I think you should read it for yourself, Kim."
This feels like a threat pic.twitter.com/NtY2GVclB2
— Cranky Federalist (@CrankyFed) September 13, 2025