Vous pourriez aimer
The gap is closing. China is catching up. Kimi-K2 Thinking crushes GPT-5 and Claude 4.5 Sonnet in several benchmarks, while costing 6 times less compared to Sonnet It's the best open-source model period Its core focus is on agentic tasks and software development. It can now…
🚀 Hello, Kimi K2 Thinking! The Open-Source Thinking Agent Model is here. 🔹 SOTA on HLE (44.9%) and BrowseComp (60.2%) 🔹 Executes up to 200 – 300 sequential tool calls without human interference 🔹 Excels in reasoning, agentic search, and coding 🔹 256K context window Built…
most devs think scalability = more servers it’s not. scalability is design stateless services, load balancing, message queues, distributed caching, and graceful degradation you don’t scale hardware you scale systems
MCP Snitch - macOS app that intercepts and monitors MCP server communications for security analysis, access control, and audit logging for AI tool usage. github.com/Adversis/mcp-s… #AI #MCP #cybersecurity
Dynamic EDR Evasion. A dive into auto-detecting EDR hooks and generating dynamic stager that compiles evasion-tailored payloads per target (with SHAPESHIFTER). A great post by Matt Hand (@matterpreter). Source: medium.com/@matterpreter/… #redteam #blueteam #maldev #evasion…
Weaponizing Trust: ClickOnce Deployment with AppDomainManager Injection malcrove.com/weaponizing-tr…
Because the last release of #NoPowerShell was 2 years ago and to celebrate the repo has 999 stars, I just merged DEV ➡️ MASTER and published Release 1.50 containing over 60 offensive cmdlets! 🥳 github.com/bitsadmin/nopo… See examples of some of the cmdlets below 👇
Sometimes you still find on-prem Exchange servers on the Internet. In such case you might wanna check out our fork of peas. It's Python 3 (ported by Codex) and grants full control over the appearance of the fake ActiveSync device (serial, model, OS, etc). github.com/glynx/peas
[433533359][reward: $70000] Consumers of ReadableStream subject to data race with SharedArrayBuffer, leading to RCE + V8 Sandbox bypass crbug.com/433533359
Evading Elastic EDR's call stack signatures with call gadgets offsec.almond.consulting/evading-elasti…
in some initial testing, Slice can successfully use gpt-oss-120b (via openrouter) to find the same UAF, while 3X faster (2.5 min) and 56X cheaper ($0.06) than using GPT-5 :)
A new tool: Slice 🔪 With the help of build-free CodeQL and Tree-Sitter, Slice can help GPT-5 can reliably reproduce discovery of CVE-2025-37778: use-after-free vulnerability in the Linux kernel! noperator.dev/posts/slice/
Yet Another DCOM Object for Command Execution Part 1 sud0ru.ghost.io/yet-another-dc…
**NEW** BHIS | Blog What are some effective ways to abuse Kerberos delegation remotely? Abusing Delegation with Impacket (Part 1): Unconstrained Delegation by: Hunter Wade (Cross-Posted) Published: 11/5/2025 Learn more: blackhillsinfosec.com/abusing-delega…
JPCERT/CC reports ongoing APT-C-60 attacks in Japan, revealing updates on malware tactics, including spear-phishing with malicious VHDX files, updates to the SpyGlace malware, and ongoing GitHub distribution efforts. #CyberSecurity #APT blogs.jpcert.or.jp/en/2025/11/APT…
The @Intel Xeon 6 Performance Feature Benchmarks: Latency Optimized Mode Testing out Granite Rapid's "Latency Optimized Mode" feature on @GigaComputing Xeon 6900P server. A look at performance and power impact. phoronix.com/review/intel-l…
💰 Up to $700K for HarmonyOS 0days — ZeroZenX Is Buying ZeroZenX announces premium rewards for critical HarmonyOS security research. We're investing in high-impact vulnerability discoveries across Huawei's ecosystem with top-tier compensation for qualified findings. Elite…
Exploit a Use-After-Free vulnerability in an ARM64 binary. Full breakdown here: 8ksec.io/arm64-reversin… #ARM64 #ReverseEngineering #Exploitation #CyberSecurity #MobileSecurity
We're excited to participate in the Frontier AI in Cyber workshop put on by @BerkeleyRDI and @schmidtsciences—tomorrow, Nov. 6! @monoxgas goes on around 12:50 PM PT with a session on building cyber agents. Register (for free) here: luma.com/frontier-ai-cy…
📢 This Thursday ( Nov 6, 9 AM PT ): Join us and ~1500 attendees for a critical conversation at a pivotal moment in AI and Cybersecurity! Benchmarks such as our CyberGym and results from the recent AIxCC competition demonstrate that AI capabilities in cybersecurity are…
🙅♂️ Exploiting an Almost Impossible XXE vulnerability in PHP Blog: swarm.ptsecurity.com/impossible-xxe… author: Aleksandr Zhurnakov (@ptswarm)
How to Unpack Malware with x64dbg TLDR; This article is an x64dbg tutorial in which reverse engineering malware methodology will be explained and demonstrated. varonis.com/blog/x64dbg-un…
United States Tendances
- 1. Nancy Pelosi 83.8K posts
- 2. Marshawn Kneeland 51.5K posts
- 3. Ozempic 9,420 posts
- 4. Michael Jackson 77.2K posts
- 5. Gordon Findlay 4,362 posts
- 6. Jaidyn 2,370 posts
- 7. Sean Dunn 2,444 posts
- 8. Craig Stammen 2,129 posts
- 9. Oval Office 29.5K posts
- 10. RFK Jr 19.5K posts
- 11. Sandwich Guy 7,108 posts
- 12. Kyrou N/A
- 13. GLP-1 6,194 posts
- 14. Pujols N/A
- 15. #MichaelMovie 73.4K posts
- 16. NOT GUILTY 17.4K posts
- 17. Novo Nordisk 9,330 posts
- 18. Abraham Accords 6,417 posts
- 19. Kazakhstan 8,279 posts
- 20. Unplanned 9,664 posts
Vous pourriez aimer
-
Chevy Phillip
@chevyphillip -
XSS Payloads
@XssPayloads -
xer0dayz
@xer0dayz -
Cliff Vazquez
@cliffvazquez -
Jason Lang
@curi0usJack -
nikhil(niks)
@niksthehacker -
Ashish Kunwar
@D0rkerDevil -
Securityblog
@Securityblog -
PentesterLab
@PentesterLab -
m0z
@LooseSecurity -
Rakesh Mane
@RakeshMane10 -
Dominic Chell 👻
@domchell -
Chintan 'Frogy' Gurjar
@iamthefrogy -
Patrick Fussell
@capt_red_beardz -
Sanoop Thomas ⠵
@s4n7h0
Something went wrong.
Something went wrong.