
__3ntr0py__
@Entrophy6
Followers
29
Following
17
Media
0
Statuses
19
Security Researcher @ s2lab, KCL London. Pentester. OSCP. Musician and life lover . HTB lover. Crypto ftw.
London, England
Joined October 2018
RT @prisec_ml: The first seminar of 2022 will be given by Prof. Li Xiong on Wed Jan 26th at 1.30 PM (London time). "Trustworthy Machine Le….
prisec-ml.github.io
0
2
0
RT @prisec_ml: Next seminar: @sarahookr (Google Brain), "The myth of the interpretable, robust, compact, and high performance deep neural n….
0
12
0
RT @lcavallaro: Interested in ML for (Privacy & Security) of ML research? Check @prisec_ml for upcoming seminars, slack to build a communit….
0
6
0
RT @nirohfeld: Microsoft just patched 4 vulnerabilities we (@wiz_io) recently reported, including a CVSS 9.8 RCE. These vulnerabilities aff….
wiz.io
Wiz Research recently found 4 critical vulnerabilities in OMI, which is one of Azure's most ubiquitous yet least known software agents and is deployed on a large portion of Linux VMs in Azure.
0
122
0
RT @zangobot: Our paper "Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Ma….
dl.acm.org
Recent work has shown that adversarial Windows malware samples—referred to as adversarial EXEmples in this article—can bypass machine learning-based detection relying on static code analysis by...
0
14
0
RT @Alra3ees: Nuclei Templates Collection:-..
github.com
nuclei templates. Contribute to z3bd/nuclei-templates development by creating an account on GitHub.
0
150
0
RT @Jonas_B_K: I have created a free and open-source tool to identify AD attack paths breaking the tier model using BloodHound. Check it ou….
github.com
Identify the attack paths in BloodHound breaking your AD tiering - improsec/ImproHound
0
110
0
RT @laurashin: On Unchained, @woonomic and @n3ocortex break down turbulent times in BTC using on-chain analytics, covering:. - How much Elo….
0
117
0
RT @Hacker0x01: The AWS CTF is going on now! Join at to test your #cloud #hacking skills. #TogetherWeCTFHarder http….
0
43
0
RT @fbpierazzi: At 15:30 CET, in Session 1 of the AISSAI Workshop of @ITASEC_Conf, I am giving a talk on our @IEEESSP 2020 paper on Problem….
0
8
0
RT @XssPayloads: Another weird one (based on Cee triangles ( by @aemkei .ᐁ='',ᐃ=!ᐁ+ᐁ,ᐅ=!ᐃ+ᐁ.ᐊ=ᐁ+{},ᐄ=ᐃ[ᐁ++],ᐆ=.ᐃ[ᐋ=….
0
28
0
RT @shodanhq: Shodan now has more than 4 million users! To celebrate we are offering the membership at a discounted price of $4 for the nex….
0
948
0
RT @orange_8361: I know there are lots of people waiting for the recent Microsoft Exchange pre-auth RCE on our side. This is a short adviso….
proxylogon.com
ProxyLogon - The latest pre-authenticated Remote Code Execution vulnerability on Microsoft Exchange Server
0
434
0
RT @Bank_Security: A Threat Actor is selling a Database of the Italian mobile service provider ho. ( owned by @Voda….
0
458
0
RT @UlisseBO: Thanks to all those who participated and guys from @cesenasec with whom we spent virtually the weekend and above all thanks t….
0
2
0
RT @intigriti: 1️⃣5️⃣.0️⃣0️⃣0️⃣ followers, time to reveal the results of our #EasterChallenge! 🎉.✅ 88 correct solutions.😅 2 unintended solu….
0
5
0
RT @s2lab: We have to limit our physical interactions, but we can enhance our virtual ones: here's the new slick Systems Security Research….
0
3
0
RT @c0mr3x: Found easy xss. 1. Subdomain enumeration.2. S3 bucket with access denied.3. Ffuf found -> /cdn/.4. Ffuf found -> /cdn/proxy.htm….
0
131
0