DarkCoder75's profile picture. {
Malware Addict
}
C# Dev, Linux, SysAdmin CyberSecu

https://cloudguardpro.com

DarkCoder

@DarkCoder75

{ Malware Addict } C# Dev, Linux, SysAdmin CyberSecu https://cloudguardpro.com

DarkCoder heeft deze post opnieuw geplaatst

SQL for Python Developers: A Hands-On Guide to Data-Driven Applications amzn.to/4499nEi

Python_Dv's tweet image. SQL for Python Developers: A Hands-On Guide to Data-Driven Applications amzn.to/4499nEi

DarkCoder heeft deze post opnieuw geplaatst

🐉 Kali Linux Command Reference Sheet

_0b1d1's tweet image. 🐉 Kali Linux Command Reference Sheet

DarkCoder heeft deze post opnieuw geplaatst

Bypassing static analysis - Deep DivE lorenzomeacci.com/bypassing-stat…

5mukx's tweet image. Bypassing static analysis - Deep DivE

lorenzomeacci.com/bypassing-stat…

DarkCoder heeft deze post opnieuw geplaatst

SilentButDeadly - a network communication blocker specifically designed to neutralize EDR/AV software by preventing their cloud connectivity using Windows Filtering Platform (WFP). github.com/loosehose/Sile…


DarkCoder heeft deze post opnieuw geplaatst

🚨 Weaponized Putty & Teams Ads Deliver Malware, Allowing Hackers to Access Network Read more: cybersecuritynews.com/weaponized-put… An ongoing malicious advertising campaign is weaponizing legitimate software downloads to deploy OysterLoader malware, previously identified as Broomstick and…

The_Cyber_News's tweet image. 🚨 Weaponized Putty & Teams Ads Deliver Malware, Allowing Hackers to Access Network 

Read more: cybersecuritynews.com/weaponized-put…

An ongoing malicious advertising campaign is weaponizing legitimate software downloads to deploy OysterLoader malware, previously identified as Broomstick and…

DarkCoder heeft deze post opnieuw geplaatst

Powershell for Hackers, Survival Edition: Part 4 hackers-arise.com/powershell-for…

three_cube's tweet image. Powershell for Hackers, Survival Edition: Part 4

hackers-arise.com/powershell-for…

DarkCoder heeft deze post opnieuw geplaatst

Understanding the Windows PE Header and Section Table.

Van TΞTSUØ

DarkCoder heeft deze post opnieuw geplaatst

Lateral movement across server room? Steven Flores (@0xthirteen) of @SpecterOps describes a new fancy WMI class that can be used to move laterally between Windows server boxes. Also, mentions methods of extending this tactic to workstations. Post: specterops.io/blog/2025/09/1…

SEKTOR7net's tweet image. Lateral movement across server room?

Steven Flores (@0xthirteen) of @SpecterOps describes a new fancy WMI class that can be used to move laterally between Windows server boxes.
Also, mentions methods of extending this tactic to workstations.

Post: specterops.io/blog/2025/09/1……

DarkCoder heeft deze post opnieuw geplaatst

You wanted more PowerShell ... so our video series with Andrew Prince continues! In today's video, Andrew Prince shows you how to detect indicators of compromise (IOCs) across a Windows network. Learn to detect telltale network signs of compromise, malware beacon activity,…

TCMSecurity's tweet image. You wanted more PowerShell ... so our video series with Andrew Prince continues! 

In today's video, Andrew Prince shows you how to detect indicators of compromise (IOCs) across a Windows network. 

Learn to detect telltale network signs of compromise, malware beacon activity,…

DarkCoder heeft deze post opnieuw geplaatst

learn x86-64 assembly by writing a GUI from scratch

Adriksh's tweet image. learn x86-64 assembly by writing a GUI from scratch

DarkCoder heeft deze post opnieuw geplaatst

Australia warns of ‘BadCandy’ infections on unpatched Cisco devices - @billtoulas bleepingcomputer.com/news/security/…


DarkCoder heeft deze post opnieuw geplaatst

Old Linux Kernel flaw CVE-2024-1086 resurfaces in ransomware attacks securityaffairs.com/184076/securit…


DarkCoder heeft deze post opnieuw geplaatst

Will this Neo cloud provide access to high-end GPUs?

PunsCyber's tweet image. Will this Neo cloud provide access to high-end GPUs?

DarkCoder heeft deze post opnieuw geplaatst

Top Hacking Gadgets

SecurityTrybe's tweet image. Top Hacking Gadgets

DarkCoder heeft deze post opnieuw geplaatst

🔓 Hiding Processes by Unlinking Kernel EPROCESS Learn how you can manipulate the EPROCESS linked list to evade process enumeration and analysis. But watch out for patchguard! 👉 guidedhacking.com/threads/kernel…

GuidedHacking's tweet image. 🔓 Hiding Processes by Unlinking Kernel EPROCESS

Learn how you can manipulate the EPROCESS linked list to evade process enumeration and analysis. But watch out for patchguard!

👉 guidedhacking.com/threads/kernel…

DarkCoder heeft deze post opnieuw geplaatst

7 Free resources to learn Linux & DevOps 1. Linux → linuxopsys.com 2. Bash → blog.sysxplore.com 3. AWS → explore.skillbuilder.aws 4. Azure → learn.microsoft.com 5. DevOps → edx.org/learn/devops 6. Docker → docker-curriculum.com 7. Kubernetes…

linuxopsys's tweet image. 7 Free resources to learn Linux & DevOps 

1. Linux → linuxopsys.com

2. Bash → blog.sysxplore.com

3. AWS → explore.skillbuilder.aws

4. Azure → learn.microsoft.com

5. DevOps → edx.org/learn/devops 

6. Docker → docker-curriculum.com

7. Kubernetes…

DarkCoder heeft deze post opnieuw geplaatst

Windows RPC lateral movement quick reference for defenders. #ThreatHunting #DFIR

ACEResponder's tweet image. Windows RPC lateral movement quick reference for defenders.

#ThreatHunting #DFIR

United States Trends

Loading...

Something went wrong.


Something went wrong.