Sophia d’Antoine(@Calaquendi44) 's Twitter Profileg
Sophia d’Antoine

@Calaquendi44

Founder @Margin_Research, Hacker in Residence @ NYU, @RPISEC

ID:768856800682713090

linkhttps://sophia.re calendar_today25-08-2016 17:05:20

360 Tweets

2,9K Followers

125 Following

Margin Research(@Margin_Research) 's Twitter Profile Photo

Margin is going to Berlin! 🇩🇪

Come take our Practical Program Analysis Class 🧑‍🎓💻🏆at offensivecon with the amazing team at Vector 35

offensivecon.org/trainings/2024…

account_circle
Ryan Stortz(@withzombies) 's Twitter Profile Photo

The iSoon leaks suggest that Qihoo 360 provides customer PII to exploit developers and cyber mercenaries to enable Chinese intelligence work.

The iSoon leaks suggest that Qihoo 360 provides customer PII to exploit developers and cyber mercenaries to enable Chinese intelligence work.
account_circle
Margin Research(@Margin_Research) 's Twitter Profile Photo

🏆 Tianfu Cup 🏆confirmed as Chinese Ministry of Public Security exploit hoarding front, and more 🚨

New blog post by Winnona 💾 on the iSoon leaks margin.re/2024/02/same-s…

🏆 Tianfu Cup 🏆confirmed as Chinese Ministry of Public Security exploit hoarding front, and more 🚨 #isoon #tianfucup New blog post by @__winn on the iSoon leaks margin.re/2024/02/same-s…
account_circle
NCSC UK(@NCSC) 's Twitter Profile Photo

To quote Dave Aitel: ‘It's only hard to find vulnerabilities if you look for hard vulnerabilities. You should look for easy ones.’ 🔍🦗

account_circle
JD Work(@HostileSpectrum) 's Twitter Profile Photo

The uninitiated reacting to Linux mailing list exchanges, for the first time realizing that one of the most complex things ever built by human hands that drives their phone, entertainment, car, banking, medical care, food & retail, power, & water exists because one man…

account_circle
Weld Pond | Chris Wysopal(@WeldPond) 's Twitter Profile Photo

Thrilled that my alma mater Rensselaer has claimed #1 in the latest Cyber Power Rankings! This achievement reflects their exceptional skills & dedication to cybersecurity. I'm sure my fellow cybersec alums Dave Aitel Robert C. Seacord (@[email protected]) Mark Russinovich Perri Adams are proud too
news.rpi.edu/approach/2023/…

account_circle
Alex Rad(@defendtheworld) 's Twitter Profile Photo

Attention @RPI students and friends. This Friday, 4pm, Sage 4101: Boston Cybernetic's @0xjeremy will make a prized appearance on campus to host a seminar on hacking techniques taught by RPISEC and how to get involved with the club

Attention @RPI students and friends. This Friday, 4pm, Sage 4101: Boston Cybernetic's @0xjeremy will make a prized appearance on campus to host a seminar on hacking techniques taught by @RPISEC and how to get involved with the club
account_circle
Cyber Statecraft(@CyberStatecraft) 's Twitter Profile Photo

The proliferation of offensive cyber capabilities poses risks to national security and human rights.

To better understand this ecosystem we asked Winnona 💾 Sophia d’Antoine Daniel Moore Chris Bing Ollie Whitehouse Monica M. Ruiz Forscey Jen Roberts for their insights.

atlanticcouncil.org/content-series…

account_circle
Cyber Statecraft(@CyberStatecraft) 's Twitter Profile Photo

Interested in learning more about offensive cyber capabilities market place and how these vendors tend to operate?

Check out our blogpost featuring Winnona 💾, Sophia d’Antoine, Daniel Moore, Chris Bing, Ollie Whitehouse, Monica M. Ruiz Forscey, and Jen Roberts here:

atlanticcouncil.org/content-series…

account_circle
Margin Research(@Margin_Research) 's Twitter Profile Photo

🚨 Our last training of the year! 🚨

🥷 Topic: Program Analysis for Vulnerability Research

🌎 Location: Remote

⏰Duration: 5-days

For more details check out our website at:
margin.re/training/

Sign up with Vector 35 at:
shop.binary.ninja/products/pavr-…

🚨 Our last training of the year! 🚨 🥷 Topic: Program Analysis for Vulnerability Research 🌎 Location: Remote ⏰Duration: 5-days For more details check out our website at: margin.re/training/ Sign up with @vector35 at: shop.binary.ninja/products/pavr-…
account_circle
Midnight Sun(@MidnightSunCTF) 's Twitter Profile Photo

💪 Security is about building as well as breaking!

🍎The next speaker, Sharvil Shah will teach us about building next-gen security tools, with a focus on macOS at

➡️conf.midnightsunctf.com/speakers/sharv…

💪 Security is about building as well as breaking! 🍎The next speaker, @sharvil will teach us about building next-gen security tools, with a focus on macOS at #MidnightSun23 ➡️conf.midnightsunctf.com/speakers/sharv…
account_circle
Margin Research(@Margin_Research) 's Twitter Profile Photo

When is a Linux kernel commit from Linus Torvalds not really from Linus Torvalds 💻

We use data ACROSS GitHub projects and AI generated topics to build a better Entity Resolution (ER) and answer this question and more.

margin.re/2023/06/entity…

account_circle
Pwnie Awards(@PwnieAwards) 's Twitter Profile Photo

🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨
ATTENTION!!! NOMINATIONS CLOSE THIS FRIDAY
🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨🚨

Did you see some amazing research in offensive security this past year? Does it deserve a horse shaped award? Nominate them below 👇

pwnies.com/nominations/

account_circle
Alex Rad(@defendtheworld) 's Twitter Profile Photo

The turtles wifi hacking challenges now have a built-in wireshark dissector on the web. Great companion to linux on v86 + hwsim + scapy. Pretty much a full browser-based WiFi lab

Play along here:
turtles.supernetworks.org/march

The turtles wifi hacking challenges now have a built-in wireshark dissector on the web. Great companion to linux on v86 + hwsim + scapy. Pretty much a full browser-based WiFi lab Play along here: turtles.supernetworks.org/march #ctf #ieee80211 #wifi #hacking #pi4 #contest
account_circle
Winnona 💾(@__winn) 's Twitter Profile Photo

🚨NEW: The Solution to Cyber Mercenaries Is Not Export Control 🚨
My first ever op-ed in Lawfare is out! Wanna know more about NSO, the cyber mercenary landscape, what export control even is, and why it’s not enough? Read on 🧵/
lawfareblog.com/export-control…

account_circle
Margin Research(@Margin_Research) 's Twitter Profile Photo

Create a Safe Browsing API to scan for malicious apps!

In a guest blogpost, our researcher David Manouchehri walks through how to use Corellium and Frida to make our own.

corellium.com/blog/create-sa…

account_circle
Cyber Statecraft(@CyberStatecraft) 's Twitter Profile Photo

The proliferation of offensive cyber capabilities poses an expanding set of risks to national security and human rights. To better understand this opaque ecosystem, we asked Winnona 💾 Sophia d’Antoine Daniel Moore Chris Bing Ollie Whitehouse Monica M. Ruiz Jen Roberts atlanticcouncil.org/content-series…

account_circle