0xApollyon Profile Banner
Apollyon Profile
Apollyon

@0xApollyon

Followers
1K
Following
2K
Media
261
Statuses
1K

Infosec | Cryptography | Development | 2007 born | Opinions my own

Abbadon
Joined October 2023
Don't wanna be here? Send us removal request.
@0xApollyon
Apollyon
6 months
Got my personal website working finally 😎.You can visit it at.
Tweet media one
3
0
22
@0xApollyon
Apollyon
15 days
Greetings everyone, .If you come across an internship posting (preferably research based) and it is open for college freshmen, please let me know. Been looking far and wide and all of what I found are for 2nd/3rd year onwards.
0
1
2
@0xApollyon
Apollyon
18 days
RT @PerkinsFund: Today we are happy to announce that we are releasing the VPS initiative! We are providing FREE VPS SERVERS to students, te….
0
12
0
@0xApollyon
Apollyon
25 days
Perils of vibecoding.
0
0
2
@0xApollyon
Apollyon
26 days
Uhhh
Tweet media one
0
0
0
@0xApollyon
Apollyon
26 days
There would be no exfiltration thus no random C2 logs on SIEMs and stuff. However doing an actual attack like that is much more difficult than it sounds in theory.
0
0
0
@0xApollyon
Apollyon
26 days
This is exactly what I thought malicious IDE extensions would be used for. Pair it with a kleptographic attack and detecting it would be a nightmare.
@cyb3rops
Florian Roth ⚡️
26 days
"I found out that the cause of the infection was an installed malicious extension for the Cursor AI IDE". In this specific case, the extension was malicious right from the beginning. But just imagine a supply chain attack targeting an open-source developer’s system, compromising.
1
0
1
@0xApollyon
Apollyon
29 days
GPT cant do binary addition btw.(asked it to generate some questions so i can get some practice)
Tweet media one
0
0
0
@0xApollyon
Apollyon
1 month
RT @OhayoMybrother: The Japanese police have developed a decryption tool for data encrypted by the Phobos/8Base ransomware and made it free….
0
772
0
@0xApollyon
Apollyon
1 month
OCaml's inbuilt PRNG is very interesting ngl, resistant to most basic attacks. Still not a CSPRNG tho.
0
0
0
@0xApollyon
Apollyon
1 month
NOOOOOOOOO.Gotta try again next semester
Tweet media one
0
0
0
@0xApollyon
Apollyon
1 month
A new blog post exploring the Mersenne Twister, a very widely used PRNG. Originally it was titled "Mersenne Twister and how to break it" however the state recovery attack i intended to cover made the post too long, will probably post it later
Tweet media one
0
0
0
@0xApollyon
Apollyon
1 month
Tweet media one
@0xApollyon
Apollyon
2 months
Yeah I wont be reproducing these results anytime soon
Tweet media one
0
0
1
@0xApollyon
Apollyon
1 month
RT @PMinervini: "in 2025 we will have flying cars" 😂😂😂
Tweet media one
0
1K
0
@0xApollyon
Apollyon
2 months
Yeah I wont be reproducing these results anytime soon
Tweet media one
1
0
3
@0xApollyon
Apollyon
2 months
Yes youtube that is exactly what I was looking for when I search for evil twin attack
Tweet media one
1
0
3
@0xApollyon
Apollyon
2 months
Or like a transformer which when asked to "generate code for my crypto casion website" intentionally backdoors your stuff and steals everything.
0
0
0
@0xApollyon
Apollyon
2 months
Is this just model poisoning or steganographed payloads with extra steps or im onto something ??.
2
0
3
@0xApollyon
Apollyon
2 months
Malware but like its hidden in the weights of an AI model. So like imagine running a local llamma on your system, and it generates code which compromises your system. Even better is if it runs commands one by one through a CLI of sorts (think claude code but evil).
4
0
16
@0xApollyon
Apollyon
2 months
Just spent like 30 minutes writing stuff for an intern application, AND IT REFRESHED WITHOUT SUBMITTING AND DELETED EVERYTHING FML.
0
0
1
@0xApollyon
Apollyon
2 months
RT @cneuralnetwork: highest risk research institutions just came out . 9/10 in the top 10 are indian universities - really shameful https:/….
0
188
0