Francisco Dominguez(@FSDominguez) 's Twitter Profileg
Francisco Dominguez

@FSDominguez

Has been dabbling for a while in offense & defense. Information should be free.

ID:278136265

linkhttp://diablohorn.com calendar_today06-04-2011 17:43:43

16,7K Tweets

1,0K Followers

690 Following

AIVD(@AIVD) 's Twitter Profile Photo

Voor het digitaal veilig functioneren van onze samenleving is het belangrijk dat organisaties de risico’s in hun supply chain kennen. De Cybercheck helpt deze in kaart te brengen 🔗 aivd.nl/actueel/nieuws…
NCSC-NL NCTV

account_circle
Hunt & Hackett(@huntandhackett) 's Twitter Profile Photo

New post! Dive into the complexities of collecting samples for analysis as we introduce an innovative forensic approach for dumping executables on Windows. From evasion techniques to transient file interactions, we explore the challenges faced by defenders.

1/10

account_circle
Thomas Roccia 🤘(@fr0gger_) 's Twitter Profile Photo

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level.

👉 code: github.com/mrwadams/attac…
👉 app: attackgen.streamlit.app

I just came across a tool called AttackGen. It's a simple tool that generates incident scenarios based on a Threat Actor and suggests simulations and possible detections at a high level. #llm #python #threatintel 👉 code: github.com/mrwadams/attac… 👉 app: attackgen.streamlit.app
account_circle
Evan McBroom(@mcbroom_evan) 's Twitter Profile Photo

I just published a blog and tool for the LSA Whisperer work that was presented at the SpecterOps Conference (SOCON) back in March.

If you are interested in getting credentials from LSASS without accessing its memory, check it out!
medium.com/specter-ops-po…

account_circle
Nick Sullivan(@grittygrease) 's Twitter Profile Photo

This paper, 'Quantum Algorithms for Lattice Problems' is a huge deal if it's proven to be correct. It's a striking new quantum algorithm that threatens an entire category of cryptography (learning with errors) that was thought to be resistant to quantum computers until now.

account_circle
Phillip Tennen(@phillipten) 's Twitter Profile Photo

I wrote a homebrew GPS receiver from scratch. Thanks to months of dedicated work, I can now say with confidence that I am somewhere in England! axleos.com/building-a-gps…

I wrote a homebrew GPS receiver from scratch. Thanks to months of dedicated work, I can now say with confidence that I am somewhere in England! axleos.com/building-a-gps…
account_circle
Rebecca📖(@Rquietlyreading) 's Twitter Profile Photo

I saw an idea recently that I thought was lovely…public libraries that are open late every night so ppl can socialize, as an alternative to bars or sitting alone at home. Would be especially perfect for introverts to socialize comfortably and for older people who are lonely.

I saw an idea recently that I thought was lovely…public libraries that are open late every night so ppl can socialize, as an alternative to bars or sitting alone at home. Would be especially perfect for introverts to socialize comfortably and for older people who are lonely.
account_circle
envy 🐾(@ehnveee) 's Twitter Profile Photo

Counter Strike hacking is one of my guilty pleasures.

This is a video of an AI tool built into one of the most popular HvH cheats on the market.

HvH (Hack vs. Hack) is a game mode where everyone in the lobby is cheating.

“If everyone is cheating, then how is it fun?”

The…

account_circle
Kaz Nejatian(@CanadaKaz) 's Twitter Profile Photo

Long term value of a company is inversely correlated to the frequency with which its leaders feel like they can't speak the truth.

Political executives who care more about how they look than the truth destroy value. Yet, business school churn out so many of these people.

account_circle
Francisco Dominguez(@FSDominguez) 's Twitter Profile Photo

Periodic reminder: Not giving an actual fuck can be a perfectly normal reaction in some situations.

Interesting books on the subject as well.

account_circle
Andrej Karpathy(@karpathy) 's Twitter Profile Photo

# explaining llm.c in layman terms

Training Large Language Models (LLMs), like ChatGPT, involves a large amount of code and complexity.

For example, a typical LLM training project might use the PyTorch deep learning library. PyTorch is quite complex because it implements a very…

account_circle
Geeknik's {{☀️}} Lab(@geeknik) 's Twitter Profile Photo

octox is a Unix-like Operating System implemented entirely in Rust. The author highlights the benefits of using Rust for OS implementation, including type-safe and memory-safe systems that prevent undefined behavior and improper memory operations.

vmm.dev/en/rust/osinru…

account_circle
blasty(@bl4sty) 's Twitter Profile Photo

some people asked for the code .. so I decided to quickly refactor my scrappy paramiko script and turned it into an ssh agent implementation that works with a vanilla openssh client that has a single line patched out. github.com/blasty/JiaTans…

some people asked for the code .. so I decided to quickly refactor my scrappy paramiko script and turned it into an ssh agent implementation that works with a vanilla openssh client that has a single line patched out. github.com/blasty/JiaTans…
account_circle
Dino A. Dai Zovi(@dinodaizovi) 's Twitter Profile Photo

Exactly this: good proactive security engineering (isolation, segmentation, least privilege) is 99%, it will even help you when the attacker has multiple 0days at their disposal.

account_circle