Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile
Ali Hadi | B!n@ry

@binaryz0ne

DFIR and Adversary Simulation | DFIR @ ProtonMail

ID: 292237196

linkhttps://keybase.io/DFIR calendar_today03-05-2011 10:00:54

21,21K Tweet

32,32K Followers

561 Following

Cyber 5W (@cyber5w) 's Twitter Profile Photo

🚨It’s Official!🚨 The C5W Certified Digital Forensics Fundamentals (CDFF) Exam is NOW LIVE! 🕵️‍♂️Real-world. Hands-on. 🎓Get certified & stand out in DFIR. Ready to prove your skills? 👉 academy.cyber5w.com/courses/c5w-ce… #C5W #CDFF #DFIR #DigitalForensics #ForensicsCertification

🚨It’s Official!🚨
The C5W Certified Digital Forensics Fundamentals (CDFF) Exam is NOW LIVE!

🕵️‍♂️Real-world. Hands-on.
🎓Get certified & stand out in DFIR.

Ready to prove your skills?
👉 academy.cyber5w.com/courses/c5w-ce…

#C5W #CDFF #DFIR #DigitalForensics #ForensicsCertification
Cyber 5W (@cyber5w) 's Twitter Profile Photo

🎥 Missed our webinar on SOC Investigation with SIEM? You can still watch it on demand! 🔍 Learn how SOCs investigate threats, correlate logs & respond using SIEM tools. ▶️ Watch now: academy.cyber5w.com/courses/webina… #C5W #SIEM #SOC #DFIR

🎥 Missed our webinar on SOC Investigation with SIEM?
You can still watch it on demand!

🔍 Learn how SOCs investigate threats, correlate logs & respond using SIEM tools.

▶️ Watch now:
academy.cyber5w.com/courses/webina…
#C5W #SIEM #SOC #DFIR
Craig Rowland - Agentless Linux Security (@craighrowland) 's Twitter Profile Photo

The SCTP protocol on Linux provides a reliable and stealthy way to access Linux. In this thread I'm going to demonstrate a simple SCTP backdoor and how it can be missed by security teams. Then I'll show you how to look for this kind of activity.

The SCTP protocol on Linux provides a reliable and stealthy way to access Linux. In this thread I'm going to demonstrate a simple SCTP backdoor and how it can be missed by security teams. Then I'll show you how to look for this kind of activity.
OpenSecurityTraining2 (@opensectraining) 's Twitter Profile Photo

Periodic call for volunteers: we'd love to see more enterprise-relevant topics. Things like red/blue/purple teaming companies, managing servers and endpoints, EDR log analysis, incident planning and response, etc. If you're interested in contributing, let us know at

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

🕵️‍♂️ For those who want to build their own #DFIR environment, check out the course below! Your support is greatly appreciated, but if you can’t pay, you can access it completely FREE. Let’s keep learning and growing together! #Cybersecurity #Infosec #DigitalForensics

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

In the past I used to be so proud of how stable my Linux system is. Now, they are a nightmare of bugs and issues regardless of what hardware you use! As much as I hate to say this, but Windows has grown far beyond Linux in stability and reliability!

Cyber 5W (@cyber5w) 's Twitter Profile Photo

🎯 Short. Practical. Affordable. Our Micro Courses deliver focused DFIR training, hands-on labs, forensic tools, and step-by-step workflows. 💸 Pay What You Can 🧪 Learn your way, anytime. 👉 labs.cyber5w.com/catalog #C5W #DFIR #MicroCourses #PayWhatYouCan

🎯 Short. Practical. Affordable.
Our Micro Courses deliver focused DFIR training, hands-on labs, forensic tools, and step-by-step workflows.
💸 Pay What You Can
🧪 Learn your way, anytime.
👉 labs.cyber5w.com/catalog
#C5W #DFIR #MicroCourses  #PayWhatYouCan
Cyber 5W (@cyber5w) 's Twitter Profile Photo

☀️ Summer Discount starts July 1st! Explore DFIR, Linux, Windows, Threat Intel & Malware Analysis. 🔥 Hands-on. Browser-based. Cert included. 🎯 Pay less, learn more. 👉 academy.cyber5w.com/collections #C5W #DFIR #CyberTraining #SummerSale

☀️ Summer Discount starts July 1st!
Explore DFIR, Linux, Windows, Threat Intel & Malware Analysis.

🔥 Hands-on. Browser-based. Cert included.
🎯 Pay less, learn more.

👉 academy.cyber5w.com/collections
#C5W #DFIR #CyberTraining #SummerSale
MatheuZ (@matheuzsecurity) 's Twitter Profile Photo

RingReaper can bypass falco and modern linux EDRs. Check: github.com/MatheuZSecurit… Detailed article: matheuzsecurity.github.io/hacking/evadin… #malware #io_uring #edr #rootkit #falcon #linux

RingReaper can bypass falco and modern linux EDRs.

Check: github.com/MatheuZSecurit…

Detailed article: matheuzsecurity.github.io/hacking/evadin…

#malware #io_uring #edr #rootkit #falcon #linux
k1nd0ne (@k1nd0ne) 's Twitter Profile Photo

New blog post in the Thanatology series. Today we dive into MBR and GPT forensics using the exhume toolkit ! #DFIR forensicxlab.com/blog/thanatolo…

New blog post in the Thanatology series. Today we dive into MBR and GPT forensics using the exhume toolkit !

#DFIR 

forensicxlab.com/blog/thanatolo…
Cyber 5W (@cyber5w) 's Twitter Profile Photo

🔥This summer, train like a pro! Get 25% OFF real-world DFIR courses at Cyber5W Academy. 💻Focused, practical hands-on investigations 📜Build skills & earn respected credentials Use code SUMMER25 to start today: 👉academy.cyber5w.com/collections #C5W #Forensics #DFIR #CyberSecurity

🔥This summer, train like a pro!
Get 25% OFF real-world DFIR courses at Cyber5W Academy.

💻Focused, practical hands-on investigations
📜Build skills & earn respected credentials

Use code SUMMER25 to start today:
👉academy.cyber5w.com/collections
#C5W #Forensics #DFIR #CyberSecurity
spencer (@techspence) 's Twitter Profile Photo

A quick and dirty powershell script to setup a honeyshare... To make this even better... Add juicy looking files like fake payroll documents, salary information, etc. gist.github.com/techspence/3ca…

A quick and dirty powershell script to setup a honeyshare...

To make this even better...

Add juicy looking files like fake payroll documents, salary information, etc.

gist.github.com/techspence/3ca…