prncpl1nf0s3c's profile picture.

principal.infosec

@prncpl1nf0s3c

principal.infosec さんがリポスト

Introductory Windows Stack Overflow Exploitation x.com/i/broadcasts/1…


principal.infosec さんがリポスト

CTRAPS: CTAP Impersonation and API Confusion Attacks on FIDO2 x.com/i/broadcasts/1…


principal.infosec さんがリポスト

Let's LLMs automate reverse engineering in Ghidra : - github.com/LaurieWired/Gh… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Let's LLMs automate reverse engineering in Ghidra :

- github.com/LaurieWired/Gh…

#infosec #cybersec #bugbountytips

principal.infosec さんがリポスト

A special shoutout to all the SMEs who helped us with specific parts of the @sansforensics FOR589 Cybercrime Intelligence course. Especially @SttyK @Jon__DiMaggio @ASG_Sc0rpi0n @DE7AULTsec and @afx_IDE. Thank you so much for all of your help 👏 FOR589: sans.org/cyber-security…

vHUMINT's tweet image. A special shoutout to all the SMEs who helped us with specific parts of the @sansforensics FOR589 Cybercrime Intelligence course. Especially @SttyK @Jon__DiMaggio @ASG_Sc0rpi0n @DE7AULTsec and @afx_IDE. Thank you so much for all of your help 👏 

FOR589: sans.org/cyber-security…

principal.infosec さんがリポスト

Cybercrime Squad detectives have charged a woman for a series of alleged cyber hacks on Western Sydney University under Strike Force Docker. MORE INFORMATION ➡ police.nsw.gov.au/news/article?i…


principal.infosec さんがリポスト

Breaking into a Cyber Security Career in 2025 x.com/i/broadcasts/1…


principal.infosec さんがリポスト

🚨 New on LABS: Malware-as-a-Smart-Contract – Part 1 🚨 Attackers abusing BSC smart contracts & compromised WordPress to serve payloads via ClickFix. Malware in the browser, C2 via blockchain - wild stuff. Full breakdown by @LiliLin41874723 👇 🔗labs.jumpsec.com/malware-as-a-s…


principal.infosec さんがリポスト

New blog: The Slow Collapse of Critical Thinking in OSINT due to AI "OSINT used to be a thinking game. Now it’s becoming a trusting game and that should terrify you." #OSINT #OSINT4good #AI Read the blog here: dutchosintguy.com/post/the-slow-…

dutch_osintguy's tweet image. New blog: The Slow Collapse of Critical Thinking in OSINT due to AI 

 "OSINT used to be a thinking game. Now it’s becoming a trusting game and that should terrify you." 

 #OSINT #OSINT4good #AI

Read the blog here: dutchosintguy.com/post/the-slow-…

principal.infosec さんがリポスト

Great new blog on LockBit 4.0 analysis! 👇

Reviving my blog with a complete analysis of the latest #LockBit #ransomware v4.0 Green! 🤠 chuongdong.com/reverse%20engi… h/t to @fwosar & @demonslay335 for all the crypto helps! Huge thanks to @BushidoToken & @CuratedIntel for the threat intelligence insight too! 🙏

cPeterr's tweet image. Reviving my blog with a complete analysis of the latest #LockBit #ransomware v4.0 Green! 🤠

chuongdong.com/reverse%20engi…

h/t to @fwosar & @demonslay335 for all the crypto helps! Huge thanks to @BushidoToken & @CuratedIntel for the threat intelligence insight too! 🙏
cPeterr's tweet image. Reviving my blog with a complete analysis of the latest #LockBit #ransomware v4.0 Green! 🤠

chuongdong.com/reverse%20engi…

h/t to @fwosar & @demonslay335 for all the crypto helps! Huge thanks to @BushidoToken & @CuratedIntel for the threat intelligence insight too! 🙏
cPeterr's tweet image. Reviving my blog with a complete analysis of the latest #LockBit #ransomware v4.0 Green! 🤠

chuongdong.com/reverse%20engi…

h/t to @fwosar & @demonslay335 for all the crypto helps! Huge thanks to @BushidoToken & @CuratedIntel for the threat intelligence insight too! 🙏
cPeterr's tweet image. Reviving my blog with a complete analysis of the latest #LockBit #ransomware v4.0 Green! 🤠

chuongdong.com/reverse%20engi…

h/t to @fwosar & @demonslay335 for all the crypto helps! Huge thanks to @BushidoToken & @CuratedIntel for the threat intelligence insight too! 🙏


principal.infosec さんがリポスト

Anyone else realised that the Russian SVR appears to be simply going back through old @BHinfoSecurity blogs and testing to see if these known techniques still work 😅 First Rogue RDP and now Device Code Phishing 1. blackhillsinfosec.com/rogue-rdp-revi… 2. blackhillsinfosec.com/dynamic-device…


principal.infosec さんがリポスト

If you are watching the Off By One Security streams via X, please consider subscribing to the channel on YouTube where you can interact during the stream and watch the video post-stream. youtube.com/@OffByOneSecur…


principal.infosec さんがリポスト

Join me on Friday, February 14th on the @offby1security stream with the amazing @33y0re (Connor McGarr) for a look at Windows Kernel Mode Shadow Stacks and the Secure Kernel! youtube.com/watch?v=T7qxs-…

Steph3nSims's tweet image. Join me on Friday, February 14th on the @offby1security stream with the amazing @33y0re (Connor McGarr) for a look at Windows Kernel Mode Shadow Stacks and the Secure Kernel!

youtube.com/watch?v=T7qxs-…

principal.infosec さんがリポスト

UpGuard , Using Exposed Ollama APIs To Find DeepSeek Models -- upguard.com/blog/deepseek-…


principal.infosec さんがリポスト

Using an AI Chatbot to Help Solve a CTF Binary Challenge! x.com/i/broadcasts/1…


principal.infosec さんがリポスト

Join me this Friday (7-Feb) at 11AM on the @offby1security stream for a session on using an AI Chatbot to help with a CTF challenge on binary exploitation. We will also be giving away 3 licenses to @mrgretzky's Evilginx Mastery course! youtube.com/watch?v=SMmvJo…

Steph3nSims's tweet image. Join me this Friday (7-Feb) at 11AM on the @offby1security stream for a session on using an AI Chatbot to help with a CTF challenge on binary exploitation. We will also be giving away 3 licenses to @mrgretzky's Evilginx Mastery course!

youtube.com/watch?v=SMmvJo…

principal.infosec さんがリポスト

Today, I'm releasing the first version of a small web 🚀: rosti.bin.re It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites. I hope it proves useful to some of you ... 🙏✨ #ThreatIntel

viql's tweet image. Today, I'm releasing the first version of a small web 🚀:  rosti.bin.re

It provides IOCs and YARA rules collected semi-automatically from public blog posts and reports of almost 200 cybersecurity sites.

I hope it proves useful to some of you ...  🙏✨ #ThreatIntel

principal.infosec さんがリポスト

On the Off By One Security Discord server, I was asked to post some questions I'd ask a potential candidate applying for a vulnerability researcher position. I'm sure some will not agree with the questions, but they work for me! Feel free to use them. discord.gg/offbyonesecuri…

Steph3nSims's tweet image. On the Off By One Security Discord server, I was asked to post some questions I'd ask a potential candidate applying for a vulnerability researcher position. I'm sure some will not agree with the questions, but they work for me! Feel free to use them. 

discord.gg/offbyonesecuri…

principal.infosec さんがリポスト

Mind-blown by this GitHub hack! 🤯 Simply change .com to .gg in any GitHub URL and instantly chat with the entire repo using AI. No more digging - just ask questions and get instant answers! Big thank you to @nisten who develops it and @thursdai_pod where it was mentioned. 👏


Loading...

Something went wrong.


Something went wrong.