offethhacker's profile picture.

Ethical Hacker

@offethhacker

Ethical Hacker a reposté

The gap is closing. China is catching up. Kimi-K2 Thinking crushes GPT-5 and Claude 4.5 Sonnet in several benchmarks, while costing 6 times less compared to Sonnet It's the best open-source model period Its core focus is on agentic tasks and software development. It can now…

scaling01's tweet image. The gap is closing. China is catching up.

Kimi-K2 Thinking crushes GPT-5 and Claude 4.5 Sonnet in several benchmarks, while costing 6 times less compared to Sonnet

It's the best open-source model period

Its core focus is on agentic tasks and software development. It can now…
scaling01's tweet image. The gap is closing. China is catching up.

Kimi-K2 Thinking crushes GPT-5 and Claude 4.5 Sonnet in several benchmarks, while costing 6 times less compared to Sonnet

It's the best open-source model period

Its core focus is on agentic tasks and software development. It can now…
scaling01's tweet image. The gap is closing. China is catching up.

Kimi-K2 Thinking crushes GPT-5 and Claude 4.5 Sonnet in several benchmarks, while costing 6 times less compared to Sonnet

It's the best open-source model period

Its core focus is on agentic tasks and software development. It can now…

🚀 Hello, Kimi K2 Thinking! The Open-Source Thinking Agent Model is here. 🔹 SOTA on HLE (44.9%) and BrowseComp (60.2%) 🔹 Executes up to 200 – 300 sequential tool calls without human interference 🔹 Excels in reasoning, agentic search, and coding 🔹 256K context window Built…

Kimi_Moonshot's tweet image. 🚀 Hello, Kimi K2 Thinking!
The Open-Source Thinking Agent Model is here.

🔹 SOTA on HLE (44.9%) and BrowseComp (60.2%)
🔹 Executes up to 200 – 300 sequential tool calls without human interference
🔹 Excels in reasoning, agentic search, and coding
🔹 256K context window

Built…


Ethical Hacker a reposté

most devs think scalability = more servers it’s not. scalability is design stateless services, load balancing, message queues, distributed caching, and graceful degradation you don’t scale hardware you scale systems


Ethical Hacker a reposté

MCP Snitch - macOS app that intercepts and monitors MCP server communications for security analysis, access control, and audit logging for AI tool usage. github.com/Adversis/mcp-s… #AI #MCP #cybersecurity

payloadartist's tweet image. MCP Snitch - macOS app that intercepts and monitors MCP server communications for security analysis, access control, and audit logging for AI tool usage.

github.com/Adversis/mcp-s…

#AI #MCP #cybersecurity

Ethical Hacker a reposté

Dynamic EDR Evasion. A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER). A great post by Matt Hand (@matterpreter). Source: medium.com/@matterpreter/… #redteam #blueteam #maldev #evasion

SEKTOR7net's tweet image. Dynamic EDR Evasion.

A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER).

A great post by Matt Hand (@matterpreter).

Source: medium.com/@matterpreter/…

#redteam #blueteam #maldev #evasion…

Ethical Hacker a reposté

Weaponizing Trust: ClickOnce Deployment with AppDomainManager Injection malcrove.com/weaponizing-tr…


Ethical Hacker a reposté

Because the last release of #NoPowerShell was 2 years ago and to celebrate the repo has 999 stars, I just merged DEV ➡️ MASTER and published Release 1.50 containing over 60 offensive cmdlets! 🥳 github.com/bitsadmin/nopo… See examples of some of the cmdlets below 👇


Ethical Hacker a reposté

Sometimes you still find on-prem Exchange servers on the Internet. In such case you might wanna check out our fork of peas. It's Python 3 (ported by Codex) and grants full control over the appearance of the fake ActiveSync device (serial, model, OS, etc). github.com/glynx/peas


Ethical Hacker a reposté

[433533359][reward: $70000] Consumers of ReadableStream subject to data race with SharedArrayBuffer, leading to RCE + V8 Sandbox bypass crbug.com/433533359


Ethical Hacker a reposté

Evading Elastic EDR's call stack signatures with call gadgets offsec.almond.consulting/evading-elasti…


Ethical Hacker a reposté

in some initial testing, Slice can successfully use gpt-oss-120b (via openrouter) to find the same UAF, while 3X faster (2.5 min) and 56X cheaper ($0.06) than using GPT-5 :)

A new tool: Slice 🔪 With the help of build-free CodeQL and Tree-Sitter, Slice can help GPT-5 can reliably reproduce discovery of CVE-2025-37778: use-after-free vulnerability in the Linux kernel! noperator.dev/posts/slice/

noperator's tweet image. A new tool: Slice 🔪 With the help of build-free CodeQL and Tree-Sitter, Slice can help GPT-5 can reliably reproduce discovery of CVE-2025-37778: use-after-free vulnerability in the Linux kernel! noperator.dev/posts/slice/


Ethical Hacker a reposté

**NEW** BHIS | Blog What are some effective ways to abuse Kerberos delegation remotely? Abusing Delegation with Impacket (Part 1): Unconstrained Delegation by: Hunter Wade (Cross-Posted) Published: 11/5/2025 Learn more: blackhillsinfosec.com/abusing-delega…

BHinfoSecurity's tweet image. **NEW** BHIS | Blog
What are some effective ways to abuse Kerberos delegation remotely?

Abusing Delegation with Impacket (Part 1): Unconstrained Delegation
by: Hunter Wade (Cross-Posted)
Published: 11/5/2025
Learn more:  blackhillsinfosec.com/abusing-delega…

Ethical Hacker a reposté

JPCERT/CC reports ongoing APT-C-60 attacks in Japan, revealing updates on malware tactics, including spear-phishing with malicious VHDX files, updates to the SpyGlace malware, and ongoing GitHub distribution efforts. #CyberSecurity #APT blogs.jpcert.or.jp/en/2025/11/APT…


Ethical Hacker a reposté

The @Intel Xeon 6 Performance Feature Benchmarks: Latency Optimized Mode Testing out Granite Rapid's "Latency Optimized Mode" feature on @GigaComputing Xeon 6900P server. A look at performance and power impact. phoronix.com/review/intel-l…


Ethical Hacker a reposté

💰 Up to $700K for HarmonyOS 0days — ZeroZenX Is Buying ZeroZenX announces premium rewards for critical HarmonyOS security research. We're investing in high-impact vulnerability discoveries across Huawei's ecosystem with top-tier compensation for qualified findings. Elite…


Ethical Hacker a reposté

Exploit a Use-After-Free vulnerability in an ARM64 binary. Full breakdown here: 8ksec.io/arm64-reversin… #ARM64 #ReverseEngineering #Exploitation #CyberSecurity #MobileSecurity

8kSec's tweet image. Exploit a Use-After-Free vulnerability in an ARM64 binary.
Full breakdown here: 8ksec.io/arm64-reversin… 
#ARM64 #ReverseEngineering #Exploitation #CyberSecurity #MobileSecurity

Ethical Hacker a reposté

We're excited to participate in the Frontier AI in Cyber workshop put on by @BerkeleyRDI and @schmidtsciences—tomorrow, Nov. 6! @monoxgas goes on around 12:50 PM PT with a session on building cyber agents. Register (for free) here: luma.com/frontier-ai-cy…

📢 This Thursday ( Nov 6, 9 AM PT ): Join us and ~1500 attendees for a critical conversation at a pivotal moment in AI and Cybersecurity! Benchmarks such as our CyberGym and results from the recent AIxCC competition demonstrate that AI capabilities in cybersecurity are…

dawnsongtweets's tweet image. 📢 This Thursday ( Nov 6, 9 AM PT ): Join us and ~1500 attendees for a critical conversation at a pivotal moment in AI and Cybersecurity!

Benchmarks such as our CyberGym and results from the recent AIxCC competition demonstrate that AI capabilities in cybersecurity are…


Ethical Hacker a reposté

🙅‍♂️ Exploiting an Almost Impossible XXE vulnerability in PHP Blog: swarm.ptsecurity.com/impossible-xxe… author: Aleksandr Zhurnakov (@ptswarm)


Ethical Hacker a reposté

How to Unpack Malware with x64dbg TLDR; This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated. varonis.com/blog/x64dbg-un…

5mukx's tweet image. How to Unpack Malware with x64dbg

TLDR; This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

varonis.com/blog/x64dbg-un…
5mukx's tweet image. How to Unpack Malware with x64dbg

TLDR; This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated.

varonis.com/blog/x64dbg-un…

Loading...

Something went wrong.


Something went wrong.