iEmoji Feeds @Mehmet Ergene (Cyb3rMonk)
1.
Mehmet Ergene
@Cyb3rMonk
Some thoughts about Microsoft Security Copilot:
Looks really cool! In order to work, it requires enough informati… twitter.com/i/web/status/1…
Looks really cool! In order to work, it requires enough informati… twitter.com/i/web/status/1…
29 Mar 23
copy & paste +upvote -downvote Some thoughts about Microsoft Security Copilot🧵:
Looks really cool! In order to work, it requires enough informati… https://t.co/WLUbBICsrA
2.
Mehmet Ergene
@Cyb3rMonk
Here are some detection ideas for ManageEngine RCE CVE-2022-47966:
1. According to the report, Java's RuntimeExec(… twitter.com/i/web/status/1…
1. According to the report, Java's RuntimeExec(… twitter.com/i/web/status/1…
20 Jan 23
copy & paste +upvote -downvote Here are some detection ideas for ManageEngine RCE CVE-2022-47966🧵:
1. According to the report, Java's RuntimeExec(… https://t.co/bFDTTHO4BU
3.
4.
5.
6.
7.
Mehmet Ergene
@Cyb3rMonk
Legendary answer about revenue!
2019 interview by sam (ceo openai)
#chatgpt pic.twitter.com/B4amgKePXn
2019 interview by sam (ceo openai)
#chatgpt pic.twitter.com/B4amgKePXn
Retweet of status by @openaicommunity
28 Dec 22
copy & paste +upvote -downvote Legendary answer about revenue!
2019 interview by sam (ceo openai) 😂👌🏼
#chatgpt https://t.co/B4amgKePXn
Mehmet Ergene
@Cyb3rMonk
I'll start writing blogs about Windows forensics artifact analysis and finding anomalies/evil using Jupyter Noteb… twitter.com/i/web/status/1…
08 Oct 22
copy & paste +upvote -downvote 📢 I'll start writing blogs about Windows forensics artifact analysis and finding anomalies/evil using Jupyter Noteb… https://t.co/Bb5N8QMcaW
Mehmet Ergene
@Cyb3rMonk
To me, jitter usage in C2 Beacons is quite useless. Let's say you set the sleep to 30s and jitter to 10s. Even if… twitter.com/i/web/status/1…
25 Apr 22
copy & paste +upvote -downvote 🧵To me, jitter usage in C2 Beacons is quite useless. Let's say you set the sleep to 30s and jitter to 10s. Even if… https://t.co/dhtjMaLOnZ
Mehmet Ergene
@Cyb3rMonk
If you want to detect post exploitation and have only firewall/proxy logs, you can use RITA-J for C2 beaconing det… twitter.com/i/web/status/1…
15 Dec 21
copy & paste +upvote -downvote 💡If you want to detect post exploitation and have only firewall/proxy logs, you can use RITA-J for C2 beaconing det… https://t.co/JAiOjzVqrX
Mehmet Ergene
@Cyb3rMonk
PhishLabs has been acquired by HelpSystems.
What should we expect from this?
What should we expect from this?
19 Oct 21
copy & paste +upvote -downvote PhishLabs has been acquired by HelpSystems.
What should we expect from this? 🤔👀
8.
Mehmet Ergene
@Cyb3rMonk
If you want to create a baseline for Rundll32.exe, here is a list of default commands and their descriptions:… twitter.com/i/web/status/1…
02 Jul 21
copy & paste +upvote -downvote If you want to create a baseline for Rundll32.exe, here is a list of default commands and their descriptions:👇… https://t.co/Pm1TFwgQlV
...but wait! There's more!
1.
fakhright
@fakhright
astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat*
14 Jan 13
copy & paste +upvote -downvote astaghfirullah peng.krim guaaaaaaaa..............a *salto sambil solat* 🙈🙈🙊