Alex Moshkov (@amoshkov) 's Twitter Profile
Alex Moshkov

@amoshkov

Community Bro @ 🟥 Positive Technologies

ID: 31758638

linkhttp://global.ptsecurity.com calendar_today16-04-2009 12:45:37

274 Tweet

570 Followers

503 Following

PT Security (@ptsecurity_en) 's Twitter Profile Photo

Need emails tied to a domain? Free? Cheap? Or burn-your-budget mode? OSINT-goblin Schwarz shows how to dig up domain emails with whatever tools (and coins) you’ve got — from open sources to deep pockets. Join the hunt at #PHTalks Jakarta 🇮🇩: phtalks.ptsecurity.com/jakarta

Need emails tied to a domain? Free? Cheap? Or burn-your-budget mode? OSINT-goblin Schwarz shows how to dig up domain emails with whatever tools (and coins) you’ve got — from open sources to deep pockets. Join the hunt at #PHTalks Jakarta 🇮🇩: phtalks.ptsecurity.com/jakarta
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

💣 Hacking ATMs? We’ve got the 💥 PT Swarm reverse engineers who turn cash machines into crash machines. 💸🧨 ⏰ Time-to-cash? More like time-to-hack and make it rain 💻💰😈 These ATMs won’t just spit receipts — they’re about to leak cash, code, and chaos. 🧾➡️💸🔥 🎤 Live at

💣 Hacking ATMs?
We’ve got the 💥 PT Swarm reverse engineers who turn cash machines into crash machines. 💸🧨

⏰ Time-to-cash?
More like time-to-hack and make it rain 💻💰😈
These ATMs won’t just spit receipts — they’re about to leak cash, code, and chaos. 🧾➡️💸🔥

🎤 Live at
PT Security (@ptsecurity_en) 's Twitter Profile Photo

South Asia’s threat game leveled up: gov/gaming/dev hits, LOLBINs, CV-lures, custom RATs & sideloading sorcery. NtAlertThread breaks down UNG0002 at #PHTalks Jakarta 🇮🇩 — packed with ops, IOCs & detection tips: phtalks.ptsecurity.com/jakarta

South Asia’s threat game leveled up: gov/gaming/dev hits, LOLBINs, CV-lures, custom RATs &amp; sideloading sorcery. <a href="/ElementalX2/">NtAlertThread</a> breaks down UNG0002 at #PHTalks Jakarta 🇮🇩 — packed with ops, IOCs &amp; detection tips: phtalks.ptsecurity.com/jakarta
PT Security (@ptsecurity_en) 's Twitter Profile Photo

Can AI MCP run a full pentest — not just scan, but think, pivot, escalate & drop a clean report? Yahya F. Al Fatih says 100% yes. See it live at #PHTalks Jakarta 🇮🇩 — protocol-driven hacking with LLMs like Claude & Mixtral: recon → exploit → root → report. phtalks.ptsecurity.com/jakarta

Can AI MCP run a full pentest — not just scan, but think, pivot, escalate &amp; drop a clean report? <a href="/BukanYahya/">Yahya F. Al Fatih</a> says 100% yes. See it live at #PHTalks Jakarta 🇮🇩 — protocol-driven hacking with LLMs like Claude &amp; Mixtral: recon → exploit → root → report. phtalks.ptsecurity.com/jakarta
PT SWARM (@ptswarm) 's Twitter Profile Photo

🧠 Our researcher Sergey Tarasov discovered a vulnerability (CVE-2025-49689) in NTFS on MS Windows. The article dives into the exploitation path, file system internals, VHD format, and more. 🔗 Read the article: swarm.ptsecurity.com/buried-in-the-…

🧠 Our researcher Sergey Tarasov discovered a vulnerability (CVE-2025-49689) in NTFS on MS Windows.

The article dives into the exploitation path, file system internals, VHD format, and more.

🔗 Read the article: swarm.ptsecurity.com/buried-in-the-…
PT Security (@ptsecurity_en) 's Twitter Profile Photo

Built-in≠safe. @ScreetSec shows how PowerShell goes full red team: recon, exploit, escalate, move laterally — all fileless, all stealth. Real offensive tricks, amsi/etw bypasses, and defense evasion that hits where it hurts. #PHTalks, Jakarta 🇮🇩, 23 Jul: phtalks.ptsecurity.com/jakarta

Built-in≠safe. @ScreetSec shows how PowerShell goes full red team: recon, exploit, escalate, move laterally — all fileless, all stealth. Real offensive tricks, amsi/etw bypasses, and defense evasion that hits where it hurts. #PHTalks, Jakarta 🇮🇩, 23 Jul: phtalks.ptsecurity.com/jakarta
Alex Moshkov (@amoshkov) 's Twitter Profile Photo

I’ll be in Shanghai July 20–21 before #PHTalks Jakarta. A few meetings with researchers/labs planned, but happy to meet others too. Hit me up if you’re around!

I’ll be in Shanghai July 20–21 before #PHTalks Jakarta. A few meetings with researchers/labs planned, but happy to meet others too. Hit me up if you’re around!
Security BSides Ahmedabad (@bsidesahmedabad) 's Twitter Profile Photo

🕒 Just 10 Minutes. One TPM Trick. Keys Stolen. 👀Watch Nikita Gnilozua-Volobuev, Security Researcher at PT Swarm, as he reveals 🔍 “How to Steal Luka Keys Using TPM & UUID Spoofing – in Just 10 Minutes”. Even trusted hardware isn’t safe when real hackers get to work. 🎯 Join

🕒 Just 10 Minutes. One TPM Trick. Keys Stolen.

👀Watch Nikita Gnilozua-Volobuev, Security Researcher at PT Swarm,
as he reveals 🔍 “How to Steal Luka Keys Using TPM &amp; UUID Spoofing – in Just 10 Minutes”.

Even trusted hardware isn’t safe when real hackers get to work. 🎯

Join
PT SWARM (@ptswarm) 's Twitter Profile Photo

😈 Read the new article "Daemon Ex Plist: LPE via MacOS Daemons" by our researcher Egor Filatov. This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick & more. swarm.ptsecurity.com/daemon-ex-plis…

😈 Read the new article "Daemon Ex Plist: LPE via MacOS Daemons" by our researcher Egor Filatov.

This research reveals a vulnerability affecting popular apps like Mozilla VPN, Tunnelblick &amp; more.

swarm.ptsecurity.com/daemon-ex-plis…
PT Security (@ptsecurity_en) 's Twitter Profile Photo

DDoS hurts, mitigation costs more. nizarakbarm drops IPList to BPFRule — a slick eBPF-powered tool for kernel-level blocking at scale. Think domain-aware, Python-driven, XDP-hooked DDoS defense built for real-world gov infra. #PHTalks Jakarta 🇮🇩: phtalks.ptsecurity.com/jakarta

DDoS hurts, mitigation costs more. <a href="/nizarakbarm/">nizarakbarm</a> drops IPList to BPFRule — a slick eBPF-powered tool for kernel-level blocking at scale. Think domain-aware, Python-driven, XDP-hooked DDoS defense built for real-world gov infra. #PHTalks Jakarta 🇮🇩: 
 phtalks.ptsecurity.com/jakarta
PT SWARM (@ptswarm) 's Twitter Profile Photo

👑 Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 & CVE-2025-22247) via VGAuth! Write-up by the one who broke it: Sergey Bliznyuk (bronzebee) swarm.ptsecurity.com/the-guest-who-…

👑 Our researcher has discovered LPE in VMWare Tools (CVE-2025-22230 &amp; CVE-2025-22247) via VGAuth!

Write-up by the one who broke it: Sergey Bliznyuk (<a href="/justbronzebee/">bronzebee</a>)

swarm.ptsecurity.com/the-guest-who-…
PT Security (@ptsecurity_en) 's Twitter Profile Photo

Ready to clash? The Standoff 16 Cyberbattle is coming October 6–8! Red vs Blue in a lifelike cyberrange: 25 attacker & 10 defender teams, 5 industries, and battle-tested mentors. Apply by September 1 → 16.standoff365.com/en/

Ready to clash? The Standoff 16 Cyberbattle is coming October 6–8! Red vs Blue in a lifelike cyberrange: 25 attacker &amp; 10 defender teams, 5 industries, and battle-tested mentors. Apply by September 1 → 16.standoff365.com/en/
Alex Moshkov (@amoshkov) 's Twitter Profile Photo

After a long way back from Indonesia 🇮🇩 and some time to reflect — #PHTalks Jakarta turned out truly amazing. 370+ attendees, strong talks. Massive THANKS to everyone who joined!

After a long way back from Indonesia 🇮🇩 and some time to reflect — #PHTalks Jakarta turned out truly amazing. 370+ attendees, strong talks. Massive THANKS to everyone who joined!
Alex Moshkov (@amoshkov) 's Twitter Profile Photo

Another legendary shot from #PHTalks Jakarta 🇮🇩 — keeping this as a tradition for every next con! Unbelievable — 370+ attendees, a record for all past talks. And this photo shows just a part of them.

Another legendary shot from #PHTalks Jakarta 🇮🇩 — keeping this as a tradition for every next con!
Unbelievable — 370+ attendees, a record for all past talks. And this photo shows just a part of them.
Alex Moshkov (@amoshkov) 's Twitter Profile Photo

On my way to Jakarta for #PHTalks, I made a quick stop in Shanghai 🇨🇳 to visit the awesome folks from @geekcontop DARKNAVY Kira. Also dropped by DawnSecurityLab, but was rushing to the airport so fast flanker017 we forgot to take a photo with the team😂 Hope to see you

On my way to Jakarta for #PHTalks, I made a quick stop in Shanghai 🇨🇳 to visit the awesome folks from @geekcontop <a href="/DarkNavyOrg/">DARKNAVY</a> <a href="/0xKira233/">Kira</a>. Also dropped by <a href="/dawnseclab/">DawnSecurityLab</a>, but was rushing to the airport so fast <a href="/flanker_hqd/">flanker017</a> we forgot to take a photo with the team😂

Hope to see you