Dino
@dinodunn.bsky.social
📤 44
📥 74
📝 45
Security Engineer with a caffeine and book addiction
github.com/Mojo8898/ali...
- very cool
#redteam
tool, handy when your syntax is maybe a little off or you just want an improved chance of staying ahead. either way very cool to play around with for CTF
#cyber
#cybersecurity
loading . . .
GitHub - Mojo8898/aliasr: Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved functionality.
Aliasr is a modern, feature-rich TUI launcher for penetration testing commands inspired by Arsenal, but with significantly improved functionality. - Mojo8898/aliasr
https://github.com/Mojo8898/aliasr
27 days ago
0
1
0
www.youtube.com/watch?v=H_c6...
Solid watch for any folks interested in AI water useage. It is pretty interesting how you could get an honest answer that is both insanely big and insanely small and it just matters how the person crunched the numbers.
#AI
#LLM
loading . . .
Why is Everyone So Wrong About AI Water Use??
YouTube video by Hank Green
https://www.youtube.com/watch?v=H_c6MWk7PQc
about 1 month ago
0
1
0
www.hackthebox.com/blog/operati...
- Solid read on operationalizing OWASP security recommendations.
#Cybersecurity
#AIsecurity
loading . . .
How to operationalize the OWASP LLM top 10 and (actually) secure GenAI apps
Deploying LLMs without chaos means treating the OWASP LLM Top 10 like an engineering spec. Learn how to turn each risk into real controls, harden pipelines, and secure GenAI apps.
https://www.hackthebox.com/blog/operationalizing-owasp-llm-top-10-llm-security-controls?utm_campaign=AI+Resilience+campaign-Oktopost&utm_medium=social-organic&utm_source=LinkedIn&utm_term=
about 1 month ago
0
1
0
owaspai.org/docs/ai_secu...
Some solid AI security resource from the OWASP AI exchange.
#cybersecurity
#OWASP
#AI
#AIsecurity
#LLM
loading . . .
0. AI Security Overview – AI Exchange
Comprehensive guidance and alignment on how to protect AI against security threats - by professionals, for professionals.
https://owaspai.org/docs/ai_security_overview/
about 1 month ago
0
0
0
github.com/Maldev-Acade...
- Really cool tool for any Red teamers looking to dump browser credentials. Take a look and thank the folks over at Mal Dev academy.
#cybersecurity
#redteam
#offensivesecurity
loading . . .
GitHub - Maldev-Academy/DumpBrowserSecrets: Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern...
Extracts browser-stored data such as refresh tokens, cookies, saved credentials, credit cards, autofill entries, browsing history, and bookmarks from modern Chromium-based and Gecko-based browsers ...
https://github.com/Maldev-Academy/DumpBrowserSecrets
about 1 month ago
0
1
0
arcanum-sec.github.io/arc_pi_taxon...
- Cool tool from Arcanum security building out different prompt injection classifications and some fun ideas if you are looking to test for some things.
loading . . .
Arcanum PI Taxonomy - Prompt Injection Attack Classification
https://arcanum-sec.github.io/arc_pi_taxonomy/
about 1 month ago
0
0
0
www.ste.gg
- Awesome new tool from the folks at BT6! if you have any quick and dirty stego needs
#cybersecurity
#cyber
loading . . .
🦕 STE.GG
https://www.ste.gg/
about 1 month ago
0
0
0
www.promptarmor.com/resources/ib...
- This is a pretty great write up on AI agent running ransomware keep a good eye on your agents
#AIsecurity
#LLMsecurit
#cybersecurity
#ai
loading . . .
IBM AI ('Bob') Downloads and Executes Malware
IBM's AI coding agent 'Bob' has been found vulnerable to downloading and executing malware without human approval through command validation bypasses exploited using indirect prompt injection.
https://www.promptarmor.com/resources/ibm-ai-(-bob-)-downloads-and-executes-malware
about 1 month ago
0
1
0
leakhub.ai
- pretty neat new site from Pliney the hacker for leaked AI system prompts
#AI
#LLM
#cybersecurity
loading . . .
LeakHub
https://leakhub.ai/
about 1 month ago
0
0
0
www.paloaltonetworks.com/resources/in...
This is a pretty awesome Infographic from
@paloaltonetworks.com
on OWASP top 10 for LLM security risks.
#LLM
#AI
#Security
#Cyber
loading . . .
OWASP Top 10 LLM Security Risks with Mitigation
OWASP Top 10 LLM Security Risks: An interactive diagram maps each risk, attack path, and concrete mitigation you can explore to secure AI systems in production
https://www.paloaltonetworks.com/resources/infographics/llm-applications-owasp-10
2 months ago
0
1
0
It be like that.... more than sometimes.
#cybersecurity
#Redteam
#EDR
2 months ago
0
1
0
It be like that.... more than sometimes.
#cybersecurity
#Redteam
#EDR
2 months ago
0
1
0
academy.hackthebox.com/course/previ...
Some really interesting courses dropping from HTB on AI privacy and defense today!
#LLM
#privacy
#AI
loading . . .
AI Privacy Course | HTB Academy
This module explores privacy attacks against machine learning models and the differential privacy defenses that protect models from such attacks.
https://academy.hackthebox.com/course/preview/ai-privacy?utm_source=bengtan.com/interesting-things/034
2 months ago
0
1
0
any.run/cybersecurit...
THIS is such a cool analysis inside the Lazarus groups operations
#cyber
#cybersecurity
#malware
loading . . .
How We Caught Lazarus's IT Workers Scheme Live on Camera
See how Lazarus Group's IT workers scheme was exposed on a live camera using real-time monitoring inside ANY.RUN’s sandbox.
https://any.run/cybersecurity-blog/lazarus-group-it-workers-investigation/?utm_source=linkedin&utm_medium=post&utm_campaign=lazarus_workers_investigation&utm_content=linktoblog&utm_term=041225
2 months ago
0
0
0
reposted by
Dino
Electronic Frontier Foundation
2 months ago
There’s a new Humble book bundle featuring a set of No Starch Press books on Hacking. For a limited time, pay what you want AND support EFF’s fight for privacy and free speech online!
www.humblebundle.com/books/hacki...
loading . . .
Humble Tech Book Bundle: Hacking by No Starch
Turn your curiosity about computer hacking into a fast-paced, proven, and practical career with the latest Humble Tech Book Bundle!
https://www.humblebundle.com/books/hacking-no-starch-books
0
54
24
It will only be weird for like a year that every new ransomware discovery gets tagged as "Satoru Gojo"
#cybersecuirty
#meme
2 months ago
0
0
0
www.youtube.com/watch?v=pRij...
- This was a really really good break down on Kerberoasting for Blue Teams highly recommend to any folks looking to understand how to triage a Kerberoasting attack.
#cybersecurity
loading . . .
Threat Watch: Spotting Kerberoasting from a blue team perspective | Learn with HTB
YouTube video by Hack The Box
https://www.youtube.com/watch?v=pRij8hODf5Y
3 months ago
0
1
0
www.exploit-db.com/google-hacki...
Kind of neat I didn't know Offsec kept a database of useful google dorks
#cybersecurity
#OSINT
loading . . .
OffSec’s Exploit Database Archive
The GHDB is an index of search queries (we call them dorks) used to find publicly available information, intended for pentesters and security researchers.
https://www.exploit-db.com/google-hacking-database
3 months ago
0
1
0
Man these
@groktr.bsky.social
upgrades are sick clearly not kissing ass at all
#ai
#llm
#memes
3 months ago
0
1
0
github.com/Pennyw0rth/N...
I feel a netexec theme today apparently. This is a netexec lab you can build to play around with Active directory. may be worth a shot if you are practicing for OSCP or just want to level up AD
#ActiveDirectory
#RedTeam
#Netexec
loading . . .
GitHub - Pennyw0rth/NetExec-Lab: Lab used for workshop and CTF
Lab used for workshop and CTF. Contribute to Pennyw0rth/NetExec-Lab development by creating an account on GitHub.
https://github.com/Pennyw0rth/NetExec-Lab
3 months ago
0
1
0
github.com/The-Viper-On...
Pretty cool tool if you are doing red teaming from a windows host. Great to add in for Commando VM from Mandiant
#redteam
#cyber
#tool
Basically it is crackmap/netexec just built in Powershell.
loading . . .
Home
Dominate Active Directory with PowerShell. . Contribute to The-Viper-One/PsMapExec development by creating an account on GitHub.
https://github.com/The-Viper-One/PsMapExec/wiki
3 months ago
0
1
0
@tcmsecurity.bsky.social
just dropped their new SOC200 course great for anyone looking to build labs and get better at incident response and threat hunting.
certifications.tcm-sec.com/psap/?utm_so...
loading . . .
Practical SOC Analyst Professional (PSAP) Certification - TCM Security
Enhance your SOC Analyst skills by earning the Practical SOC Analyst Professional (PSAP) certification. Includes training and one free retake!
https://certifications.tcm-sec.com/psap/?utm_source=linkedin&utm_medium=social_post&utm_campaign=bfcm_2025
3 months ago
0
0
0
cset.georgetown.edu/article/ai-r...
- Great article on Ai Red teaming
#Cybersecurity
#AI
#AIsecurity
loading . . .
AI Red-Teaming Design: Threat Models and Tools | Center for Security and Emerging Technology
Red-teaming is a popular evaluation methodology for AI systems, but it is still severely lacking in theoretical grounding and technical best practices. This blog introduces the concept of threat model...
https://cset.georgetown.edu/article/ai-red-teaming-design-threat-models-and-tools/
4 months ago
0
3
0
www.vulncheck.com/blog/state-o...
some great threat intel from Vulncheck
loading . . .
State of Exploitation - A look Into The 1H-2025 Vulnerability Exploitation & Threat Activity | Blog | VulnCheck
A Look into the Last 6-months of Vulnerability Exploitation… January-June 2025
https://www.vulncheck.com/blog/state-of-exploitation-1h-2025
7 months ago
0
1
0
open.spotify.com/episode/1fEa...
- North Korean's inflitrating US companies for cash is pretty big news right now and also pretty fascinating. This story is about one of the folks who manage a north Korean laptop farm and its pretty interesting.
#Cybersecurity
#Laptopfarm
loading . . .
The Everyday American Who Hustled for North Korea
The Journal. · Episode
https://open.spotify.com/episode/1fEa5Zb4VcYj3TGrk7talJ?si=1709baf6e1214cdb
9 months ago
0
1
0
www.hackthelogs.com/mainpage.html
Another great resource for Detection Engineers and anyone working with SIEM's
#Cybersecurity
loading . . .
https://www.hackthelogs.com/mainpage.html
9 months ago
0
0
0
Really cool one for anyone in Appsec or red team awesome XSS cheat sheet from PortSwigger.
portswigger.net/web-security...
#Cybersecurity
#Cheatsheet
#Appsec
loading . . .
Cross-Site Scripting (XSS) Cheat Sheet - 2025 Edition | Web Security Academy
Interactive cross-site scripting (XSS) cheat sheet for 2025, brought to you by PortSwigger. Actively maintained, and regularly updated with new vectors.
https://portswigger.net/web-security/cross-site-scripting/cheat-sheet
9 months ago
0
0
0
cvemon.intruder.io
- Great tool for any folks in Vulnerability Management. Helpful to see whats going on in CVE's.
#VulnManagement
#cybersecurity
loading . . .
Top CVE Trends & Expert Vulnerability Insights
Stay ahead with the latest insights on trending vulnerabilities. Discover today's top 10 CVEs on social media. Get free and expert commentary from Intruder
https://cvemon.intruder.io/
9 months ago
0
1
1
academy.hackthebox.com/path/preview...
- Killer resource for anyone in Cybersecurity looking to level up their skills on AI security!
#AIsecurity
#cybersecurity
#redTeam
loading . . .
AI Red Teamer Job Role Path | HTB Academy
The AI Red Teamer Job Role Path, in collaboration with Google, trains cybersecurity professionals to assess, exploit, and secure AI systems. Covering prompt...
https://academy.hackthebox.com/path/preview/ai-red-teamer
9 months ago
0
1
1
reposted by
Dino
Catalin Cimpanu
9 months ago
New Darwin Awards 2025 nominee: A Russian space academy cadet created a tool to access classified data on the Russian MOD network and was selling it for only $100 on Russia's biggest classified ads portal He was arrested by the FSB last week
t.me/voenpravoru/...
loading . . .
Правовой уголок офицера
🪖 // Скандал в Военно-космической академии: курсант задержан за взлом защищенной информации Курсант Военно-космической академии имени А.Ф. Можайского разработал программу, способную взламывать защит...
https://t.me/voenpravoru/12260
3
9
5
medium.com/@dub-flow/ho...
Great into for secure code review along with some resources to help folks get better at it
#cybersecurity
#code
loading . . .
How to Get Started with Secure Code Review
Since starting my secure code review challenges in December 2023 (https://github.com/dub-flow/secure-code-review-challenges), many people…
https://medium.com/@dub-flow/how-to-get-started-with-secure-code-review-89bcf2eb7ec4
11 months ago
0
1
1
orange-cyberdefense.github.io/ocd-mindmaps...
such a cool Active Directory min map for offensive security
#Activdirectory
#cybersecurity
#redteam
loading . . .
https://orange-cyberdefense.github.io/ocd-mindmaps/img/mindmap_ad_dark_classic_2025.03.excalidraw.svg
11 months ago
0
0
0
academy.hackthebox.com/path/preview...
- This is virtually free
@hackthebox.bsky.social
silly cube payment system makes me feel like im a kid at Chuck-E-Cheese again BUT the content is excellent and great for anyone starting from the ground up in AI red teaming
#AI
#infosec
#Cybersecurity
loading . . .
AI Red Teamer Job Role Path | HTB Academy
The AI Red Teamer Job Role Path, in collaboration with Google, trains cybersecurity professionals to assess, exploit, and secure AI systems. Covering prompt...
https://academy.hackthebox.com/path/preview/ai-red-teamer
about 1 year ago
0
1
1
www.npr.org/sections/pla...
- This is a pretty good read on
#AI
. Simply put the comparison is to coal back in England in the 1800s as efficiency increased the common thought was consumption would decrease. But instead there was a rebound effect. Some are pondering if this will be the same for AI/LLM
loading . . .
Why the AI world is suddenly obsessed with a 160-year-old economics paradox
The primer on Jevons paradox that you didn't know you needed.
https://www.npr.org/sections/planet-money/2025/02/04/g-s1-46018/ai-deepseek-economics-jevons-paradox
about 1 year ago
0
1
0
cloud.google.com/blog/topics/...
- great read from Google on Adversarial misuse of Gen AI and what they have been seeing from threat actors lately. Too many cool take aways to fit them all in
#infosec
#cybersecurity
#AIsecurity
loading . . .
Adversarial Misuse of Generative AI | Google Cloud Blog
We share our findings on government-backed and information operations threat actor use of the Gemini web application.
https://cloud.google.com/blog/topics/threat-intelligence/adversarial-misuse-generative-ai/
about 1 year ago
0
0
0
www.ransomware.live/vulns
This is such a cool site if you are in CTI and not using it I think it can easily make it into your weekly checks. Beyond the great wealth of Ransomware data they just added some of
@bushidotoken.net
's CVE,TOOLS and TTP's matrix.
#CTI
#threatintel
#cybersecurity
loading . . .
Ransomware.live 👀
Ransomware.live tracks ransomware groups and their activity. It was created by Julien Mousqueton, a security researcher. The website provides information on the groups' infrastructure, victims, and payment demands. It also includes a live map that shows the latest ransomware attacks.
https://www.ransomware.live/vulns
about 1 year ago
1
1
0
www.kelacyber.com/blog/deepsee...
- Great read on DeepSeek security flaws. personal experience it is a little bit easier to jailbreak than others which can pose some risk. Though I do feel there is a bit of overblown hype around some aspects.
#cybersecurit
#AI
#llm
loading . . .
DeepSeek R1 Exposed: Security Flaws in China’s AI Model
Discover the security flaws in DeepSeek R1, a Chinese AI model with advanced reasoning capabilities. KELA's analysis reveals vulnerabilities, outdated safeguards, and privacy risks, emphasizing the ne...
https://www.kelacyber.com/blog/deepseek-r1-security-flaws/?utm_campaign=Blogs&utm_medium=email&_hsenc=p2ANqtz-9H6WQNWVbJjz1xxfx2uA3AqWTb0fSdyunPtx_MU5pR46sonOkZdNj7eNVrdNge_099UF7YAoY2BNnbHUrVGLTbI8e9zMeTLpQ-Pmm9Ht05YAzAABw&_hsmi=344373757&utm_content=344373757&utm_source=hs_email
about 1 year ago
0
0
0
buckets.grayhatwarfare.com
- This is a pretty neat search engine for open/public/misconfigured buckets both S3 and any other S3 similar cloud product (Digital Ocean, Azure Blob, Google Drive etc.)
#cybersecurity
#CloudSecurity
#security
#infosec
loading . . .
Public Buckets by GrayhatWarfare
https://buckets.grayhatwarfare.com/
about 1 year ago
0
0
0
github.com/lkarlslund/n...
- Nuke it from orbit is a pretty neat concept of removing AV/EDR when you have physical access to a machine might be fun to play around with but also use with care 😁
loading . . .
GitHub - lkarlslund/nifo: Nuke It From Orbit - remove AV/EDR with physical access
Nuke It From Orbit - remove AV/EDR with physical access - lkarlslund/nifo
https://github.com/lkarlslund/nifo
about 1 year ago
0
0
0
www.humblebundle.com/books/hackin...
- Killer bundle of books for $20 from humble bundle evading EDR and windows security internals such a good deal for anyone in Cybersecurity.
#cybersecuriry
#infosec
#Hacking
loading . . .
Humble Tech Book Bundle: Hacking 2024 by No Starch
Level up your hacking and skills with this tech bundle from No Starch. Learn to protect yourself and others! Pay what you want & support charity!
https://www.humblebundle.com/books/hacking-2024-no-starch-books?hmb_source=&hmb_medium=product_tile&hmb_campaign=mosaic_section_1_layout_index_1_layout_type_threes_tile_index_1_c_hacking2024nostarch_bookbundle
about 1 year ago
0
1
1
www.elastic.co/security-lab...
- great read on maturity model for Detection Engineering.
#infosec
#cybersecurity
#cyber
#Detection
loading . . .
Elastic releases the Detection Engineering Behavior Maturity Model — Elastic Security Labs
Using this maturity model, security teams can make structured, measurable, and iteritive improvements to their detection engineering teams..
https://www.elastic.co/security-labs/elastic-releases-debmm
about 1 year ago
0
2
1
juniverse.securitybreak.io
- Some pretty useful Jupyter Notebooks for infosec IOC extractor, threat intel summarization and more.
#infosec
#cybersecurity
#python
#LLM
loading . . .
Streamlit
https://juniverse.securitybreak.io/
about 1 year ago
0
1
0
pentestlaboratories.com/2021/05/17/a...
- awesome write up on various AMSI bypass methods
#cybersecurity
#redteaming
#infosec
loading . . .
AMSI Bypass Methods
Microsoft has developed AMSI (Antimalware Scan Interface) as a method to defend against common malware execution and protect the end user. By default windows defender interacts with the AMSI API to…
https://pentestlaboratories.com/2021/05/17/amsi-bypass-methods/
about 1 year ago
1
5
0
github.com/WithSecureLa...
- Pretty neat new Cloud security Virtual machine with allot of great pre installed tools.
#cloudsecurity
#cybersecurity
#redteaming
#security
loading . . .
GitHub - WithSecureLabs/cloud-security-vm: Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments
Ansible/Vagrant/Packer files to create a virtual machine with the tooling needed to perform cloud security assessments - WithSecureLabs/cloud-security-vm
https://github.com/WithSecureLabs/cloud-security-vm
over 1 year ago
0
3
2
github.com/pasquini-dar...
Pretty awesome concept for defense against offensive AI agents. Conceptually it is a honey pot that leads the AI agent to indirect prompt injection. Very cool for anyone interested in
#AIsecurity
#llmsecurity
#cybersecurity
loading . . .
GitHub - pasquini-dario/project_mantis
Contribute to pasquini-dario/project_mantis development by creating an account on GitHub.
https://github.com/pasquini-dario/project_mantis
over 1 year ago
0
2
0
you reached the end!!
feeds!
log in