bbinfosec's profile picture. Just Another guy whom plays 0 and 1 to make the people secure!

blueberryinfosec

@bbinfosec

Just Another guy whom plays 0 and 1 to make the people secure!

blueberryinfosec さんがリポスト

By Col Wattal (retd),PARA’s It was a total intelligence failure. Well, That’s what they want you to believe. But the truth? It isn’t trending. It’s buried beneath…


First pause the crowdstrike update via gpo,and for the bitlocker do mass rotation via gpo using intune we can rotate the bitlocker in bulk for temporary activity github.com/christopherbax… #Crowdstrike #bitlocker #bsod


Temp workaround would be Computer configuration\Windows Components\Bitlocker drive Encryption\OS Drive\Save Bitlocker Key in AD DS #bitlocker


blueberryinfosec さんがリポスト

💧 SYSTEM PROMPT LEAK 💧 gm! here's OpenAI's system prompt for the Custom GPT Editor: """ ## System Prompt You are ChatGPT, a large language model trained by OpenAI, based on the GPT-4 architecture. You are an iterative prototype playground for developing a new GPT. The user…

elder_plinius's tweet image. 💧 SYSTEM PROMPT LEAK 💧

gm! here's OpenAI's system prompt for the Custom GPT Editor:
"""
## System Prompt

You are ChatGPT, a large language model trained by OpenAI, based on the GPT-4 architecture. You are an iterative prototype playground for developing a new GPT. The user…

blueberryinfosec さんがリポスト

How to analyze stocks:

QCompounding's tweet image. How to analyze stocks:

blueberryinfosec さんがリポスト

IAFs upgraded SAP-518 electronic warfare pods for its Su-30 MKI fleet, now have the capability to jam enemy AESA, LPI and FHSS radars.


blueberryinfosec さんがリポスト

GPTs for Cybersecurity Collection github.com/fr0gger/Awesom…

blackorbird's tweet image. GPTs for Cybersecurity Collection
github.com/fr0gger/Awesom…

blueberryinfosec さんがリポスト

The world stands on the brink of #WorldWarIII It depends on China and Iran whether they stop it or not because everything depends on their decisions about #Israel and #Taiwan


blueberryinfosec さんがリポスト

The Upcoming AI Wars and The Science Behind Multimodal Large Language Models (MLLMs) Today, GPT-4 reigns supreme on all the LLM benchmarks and leaderboards but rumors are that it will soon be displaced. Google is claiming its Gemini model is 5 times more powerful than GPT-4.…

bindureddy's tweet image. The Upcoming AI Wars and The Science Behind Multimodal Large Language Models (MLLMs)

Today, GPT-4 reigns supreme on all the LLM benchmarks and leaderboards but rumors are that it will soon be displaced.

Google is claiming its Gemini model is 5 times more powerful than GPT-4.…

blueberryinfosec さんがリポスト

🚨🚨 BIG : WE URGE ALL USERS TO UPDATE THEIR #Apple devices urgently. @citizenlab in coordination with @Google’s TAG team found that former Egyptian MP Ahmed Eltantawy was targeted with Cytrox’s #Predator #spyware through links sent via SMS and WhatsApp. citizenlab.ca/2023/09/predat…


blueberryinfosec さんがリポスト

Metasploit has a very nice attack flow on finding vulnerable ADCS certificates for exploitation. Currently metasploit supports attacking ESC1 to ESC4. I always feel like this alternate tooling isn't talked about near as much. docs.metasploit.com/docs/pentestin…


blueberryinfosec さんがリポスト

A detailed two part video showing how we found a DNS parsing vulnerability and wrote a remote root exploit for it🤌 Part 1: Finding the vulnerability via "fuzzing" and reverse engineering with Ghidra 👾 youtube.com/watch?v=xWoQ-E… Part 2: Understanding vulnerability constraints and…

pedrib1337's tweet image. A detailed two part video showing how we found a DNS parsing vulnerability and wrote a remote root exploit for it🤌

Part 1: Finding the vulnerability via "fuzzing" and reverse engineering with Ghidra 👾
youtube.com/watch?v=xWoQ-E…

Part 2: Understanding vulnerability constraints and…
pedrib1337's tweet image. A detailed two part video showing how we found a DNS parsing vulnerability and wrote a remote root exploit for it🤌

Part 1: Finding the vulnerability via "fuzzing" and reverse engineering with Ghidra 👾
youtube.com/watch?v=xWoQ-E…

Part 2: Understanding vulnerability constraints and…

blueberryinfosec さんがリポスト

“HuggingFace’s leaderboards show how truly blind they are because they actively hurting the open source movement by tricking it into creating a bunch of models that are useless for real usage.” Ouch. semianalysis.com/p/google-gemin…


blueberryinfosec さんがリポスト

KRBJack A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse. github.com/almandin/krbja… #infosec #pentesting #redteam #cybersecurity

hack_git's tweet image. KRBJack

A Kerberos AP-REQ hijacking tool with DNS unsecure updates abuse.

github.com/almandin/krbja…

#infosec #pentesting #redteam #cybersecurity

blueberryinfosec さんがリポスト

BalCCon2k23 - System Failure - 8 | 9 | 10 September 2023, Novi Sad, Serbia is right about the corner!!! Preliminary speaker list for #BalCCon2k23 is online: lnkd.in/eXtPQCHS Tickets/BalCCon2k3 Badge/T-Shirts are available for pre-order: lnkd.in/evfni2ay


blueberryinfosec さんがリポスト

Okay, who did this? nvd.nist.gov/vuln/detail/CV…

cyb3rops's tweet image. Okay, who did this?
nvd.nist.gov/vuln/detail/CV…
cyb3rops's tweet image. Okay, who did this?
nvd.nist.gov/vuln/detail/CV…

blueberryinfosec さんがリポスト

Check out our repo on #GitHub


blueberryinfosec さんがリポスト

"Azure-AD-Incident-Response-PowerShell-Module: The Azure Active Directory Incident Response PowerShell module ..." #infosec #pentest #redteam github.com/AzureAD/Azure-…

CyberWarship's tweet image. "Azure-AD-Incident-Response-PowerShell-Module: The Azure Active Directory Incident Response PowerShell module ..."

#infosec #pentest #redteam 
 github.com/AzureAD/Azure-…

Loading...

Something went wrong.


Something went wrong.