S̀͆̚h͂ͬ͆̇̋̍̒e͐ͬͤ͑͂ͯ̌lͦdo̓̄̆n̄̋ͦ̍ͦ̏ (@poppa_shell) 's Twitter Profile
S̀͆̚h͂ͬ͆̇̋̍̒e͐ͬͤ͑͂ͯ̌lͦdo̓̄̆n̄̋ͦ̍ͦ̏

@poppa_shell

Christ Follower | Husband | Father | InfoSec Nerd | Beard Enthusiast | ESTJ | GSEC, GPEN, CISSP | Co-Host @DCG940 | @hacknotcrime Advocate

ID: 30004536

calendar_today09-04-2009 15:28:37

2,2K Tweet

994 Followers

1,1K Following

Tal Be'ery (@talbeerysec) 's Twitter Profile Photo

Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC). It does not get worse than that. Probably will be included in #ransomware campaigns. Any technical analysis of CVE-2024-49112 published? CC: 🥝🏳️‍🌈 Benjamin Delpy Will Schroeder Andy Robbins

Unauthenticated Remote Code Execution (RCE) on Domain Controllers (DC).
It does not get worse than that. Probably will be included in #ransomware campaigns.
Any technical analysis of CVE-2024-49112 published? 
CC: <a href="/gentilkiwi/">🥝🏳️‍🌈 Benjamin Delpy</a> <a href="/harmj0y/">Will Schroeder</a> <a href="/_wald0/">Andy Robbins</a>
RemcoS (@rsprooten) 's Twitter Profile Photo

Check out my new blog post on declawing PUMAKIT, a sneaky #LKM #rootkit targeting Linux systems. Find out how it hides, escalates privileges, and stays under the radar. Don’t miss the deep-dive! elastic.co/security-labs/… #cybersecurity #malwareanalysis #linux

Matcluck (@doopsec) 's Twitter Profile Photo

Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin! github.com/CrowdStrike/sc…

Just released SCCMHound! A BloodHound collector for SCCM. SCCMHound allows both attackers and defenders to construct BloodHound datasets using the vast 
amount of information that is stored/retrievable through SCCM. Feel free to take it for a spin!

github.com/CrowdStrike/sc…
BSidesDFW (@bsidesdfw) 's Twitter Profile Photo

Happy New Year! Refreshing your calender and agenda for 2025? Do not forget your giving strategy. Does your company offer donation matching? Security BSides Dallas-Fort Worth (BSidesDFW) would be thrilled if we were on your list. #SupportBSides #BSidesDFW2025

DC940 (@dcg940) 's Twitter Profile Photo

The day has finally come! No no, I'm not talking about the Presidential Inauguration. It's this months DC940 Meetup Day. We hope to see you there! discord.gg/REWJbbnv?event…

Jack Rhysider 🏴‍☠️ (@jackrhysider) 's Twitter Profile Photo

Ross Ulbricht When you're feeling up for it, I'd love to sit down with you for an interview. But get some rest, catch your breath, and let the reality sink in for a while. Enjoy yourself.

DC940 (@dcg940) 's Twitter Profile Photo

DC940 February Meetup is this Monday! Bring yourself & friends for great food, drinks, convo & professional networking. All skill levels & ages are welcome. For more details about each event, follow us on Eventbrite or join our Discord. Links on dc940.org

Dave Kennedy (@hackingdave) 's Twitter Profile Photo

So my sleep number bed sprung a small tiny leak in it, while I get time to get replacement parts I was finding I was sinking in the bed slowly at night and messing up my sleep. What did I do? Find an undocumented api call that now runs on a cron job on a Linux server that

Marc Menninger (@marcmenninger) 's Twitter Profile Photo

🚨 Break-Glass Accounts: What They Are & How to Use Them Safely Every org needs a way to access critical systems when MFA fails or identity systems go down. That’s where break-glass accounts come in. Here’s how to set them up - and what not to do. 🧵

Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

🤓 A friend of mine shared me an article published today about a clever and interesting concept called LargeLanguageC2. Let me break it down simply 👇 It is a steganographic Command & Control channel that hides commands inside natural language text. Here’s how it works: 👾

🤓 A friend of mine shared me an article published today about a clever and interesting concept called LargeLanguageC2.

Let me break it down simply 👇 

It is a steganographic Command &amp; Control channel that hides commands inside natural language text.

Here’s how it works:
👾
Greg Linares (Laughing Mantis) (@laughing_mantis) 's Twitter Profile Photo

Truly humbled to share I had the honor of being a guest on the legendary Darknet Diaries. We talked about some wild stories, the epic screw ups, and others adventures. Really grateful for the chance to tell a few tales and hope it resonates with some darknetdiaries.com/episode/160/