Soufiane's Avatar

Soufiane

@s0ufi4n3

Random internet user breaking stuff since 99

2,305
Followers
18
Following
22
Posts
29.12.2023
Joined
Posts Following

Latest posts by Soufiane @s0ufi4n3

You know it's bad when Trump is involved in whatever manner

07.02.2026 10:27 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Here’s how I use LLMs to help me write code Online discussions about using Large Language Models to help write code inevitably produce comments from developers who’s experiences have been disappointing. They often ask what they’re doing wrongβ€”h...

If you're interested in an example I have >25 years of professional software development experience - I wrote about how I use LLMs to write code in detail here simonwillison.net/2025/Mar/11/...

03.05.2025 10:04 πŸ‘ 28 πŸ” 4 πŸ’¬ 3 πŸ“Œ 0
Preview
GitHub - watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591 Contribute to watchtowrlabs/fortios-auth-bypass-check-CVE-2024-55591 development by creating an account on GitHub.

CVE-2024-55591 Fortinet FortiOS Authentication Bypass PoC github.com/watchtowrlab...

16.01.2025 09:19 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
IntelBroker Unmasked: KELA’s In-Depth Analysis of a Cybercrime Leader Introduction In the ever-evolving world of cybercrime, IntelBroker has emerged as one of its most prominent figures. Known for his high-profile breaches, IntelBroker’s actions have shaken both corpora...

Cool investigation from Kela... But let's be a bit more.. nuanced... IntelBroker's actions have never "shaken both corporations and government entities alike."

www.kelacyber.com/blog/intelbr...

15.01.2025 18:38 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Abusing AWS Native Services: Ransomware Encrypting S3 Buckets with SSE-C The Halcyon RISE Team has identified a unique ransomware technique that encrypts Amazon S3 buckets with no known method to recover unless a ransom is paid...

Threat actor Codefinger abuses publicly disclosed AWS keys with permissions to write and read S3 objects. By utilizing AWS native services, they achieve encryption in a way that is both secure and unrecoverable without their cooperation.

www.halcyon.ai/blog/abusing...

13.01.2025 17:39 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - CrowdStrike/sccmhound: A BloodHound collector for Microsoft Configuration Manager A BloodHound collector for Microsoft Configuration Manager - CrowdStrike/sccmhound

SCCMHound is a C# BloodHound collector for Microsoft Configuration Manager (MCM). If you're looking for a way to collect BloodHound session information from Configuration Manager's users and computers then this is the tool for you!

github.com/CrowdStrike/...

23.12.2024 15:50 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - rad9800/FileRenameJunctionsEDRDisable Contribute to rad9800/FileRenameJunctionsEDRDisable development by creating an account on GitHub.

PendingFileRenameOperations + Junctions EDR Disable

github.com/rad9800/File...

13.12.2024 11:20 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
12.12.2024 17:00 πŸ‘ 1 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
Oasis Security Research Team Discovers Microsoft Azure MFA Bypass Critical vulnerability could have allowed malicious actors to gain unauthorized access to users’ Microsoft accounts.

Oasis Security's research team uncovered a critical vulnerability in Microsoft's Multi-Factor Authentication (MFA) implementation

oasis.security/resources/bl...

12.12.2024 06:23 πŸ‘ 15 πŸ” 5 πŸ’¬ 0 πŸ“Œ 1
Preview
iVerify Mobile Threat Investigation Uncovers New Pegasus Samples iVerify’s Mobile Threat Hunting finds Pegasus spyware is more prevalent and capable of infecting a wide range of devices, not just devices of high-risk users.

NSO Group’s Pegasus Spyware Detected in New Mobile Devices

iverify.io/blog/iverify...

05.12.2024 19:35 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - TheN00bBuilder/cve-2024-11477-writeup: CVE-2024-11477 7Zip Code Execution Writeup and Analysis CVE-2024-11477 7Zip Code Execution Writeup and Analysis - TheN00bBuilder/cve-2024-11477-writeup

CVE-2024-11477 7Zip Code Execution Writeup and Analysis
github.com/TheN00bBuild...

01.12.2024 12:50 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
ZABBIX SUPPORT

Zabbix SQL injection in user.get API (CVE-2024-42327)

support.zabbix.com/plugins/serv...

01.12.2024 10:15 πŸ‘ 3 πŸ” 1 πŸ’¬ 0 πŸ“Œ 0
Preview
a man in a suit and tie is smiling with his eyes closed ALT: a man in a suit and tie is smiling with his eyes closed

The linpeas.sh version hosted at linpeas.sh is sending info to a remote server

github.com/peass-ng/PEA...

27.11.2024 16:31 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Hacker in Snowflake Extortions May Be a U.S. Soldier Two men have been arrested for allegedly stealing data from and extorting dozens of companies that used the cloud data storage company Snowflake, but a third suspect -- a prolific hacker known as Kibe...

The Snowflake saga continue as one of the threat actors in the extortions may be a U.S. soldier

krebsonsecurity.com/2024/11/hack...

27.11.2024 05:58 πŸ‘ 0 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
GitHub - decoder-it/KrbRelayEx Contribute to decoder-it/KrbRelayEx development by creating an account on GitHub.

KrbRelayEx is a tool designed for performing Man-in-the-Middle (MitM) attacks by relaying Kerberos AP-REQ tickets.

github.com/decoder-it/K...

26.11.2024 13:44 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Merci pour ce rΓ©sumΓ© !

25.11.2024 19:17 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0

Still Russia could easily nuke the world many times over (so could the USA).

24.11.2024 19:07 πŸ‘ 0 πŸ” 0 πŸ’¬ 1 πŸ“Œ 0
Preview
The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access In early February 2022, notably just ahead of the Russian invasion of Ukraine, Volexity made a discovery that led to one of the most fascinating and complex incident investigations Volexity had ever w...

Fascinating story:

The Nearest Neighbor Attack: How A Russian APT Weaponized Nearby Wi-Fi Networks for Covert Access

www.volexity.com/blog/2024/11...

22.11.2024 20:21 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Post image

πŸ’‘Did you know that #Hunters International provides a tool to their affiliates that allows them to leak stolen data on the brand storefront *without* uploading it anywhere and keeping it on their own servers? #Ransomware

22.11.2024 12:58 πŸ‘ 0 πŸ” 1 πŸ’¬ 1 πŸ“Œ 1
Disclosure of 7 Android and Google Pixel Vulnerabilities

Disclosure of 7 Android and Google Pixel Vulnerabilities
blog.oversecured.com/Disclosure-o...

22.11.2024 11:40 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
a dirt road going through a desert landscape with mountains in the background ALT: a dirt road going through a desert landscape with mountains in the background
22.11.2024 07:22 πŸ‘ 1 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Apple Confirms Zero-Day Attacks Hitting macOS Systems Apple rushes out out major macOS and iOS security updates to cover a pair of vulnerabilities already being exploited in the wild.

Apple Confirms Zero-Day Attacks Hitting macOS Systems
www.securityweek.com/apple-confir...

22.11.2024 06:04 πŸ‘ 3 πŸ” 1 πŸ’¬ 1 πŸ“Œ 0

Chromium is opensource.. So they will have to contribute more πŸ˜…

21.11.2024 21:44 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0
Preview
Leaked Documents Show What Phones Secretive Tech β€˜Graykey’ Can Unlock The documents provide never-been-seen insight into the current cat-and-mouse game between forensics companies and phone manufacturers Apple and Google.

Leaked Documents Show What Phones Secretive Tech β€˜Graykey’ Can Unlock

www.404media.co/leaked-docum...

21.11.2024 21:32 πŸ‘ 2 πŸ” 0 πŸ’¬ 0 πŸ“Œ 0