Entrophy6 Profile Banner
__3ntr0py__ Profile
__3ntr0py__

@Entrophy6

Followers
29
Following
17
Media
0
Statuses
19

Security Researcher @ s2lab, KCL London. Pentester. OSCP. Musician and life lover . HTB lover. Crypto ftw.

London, England
Joined October 2018
Don't wanna be here? Send us removal request.
@Entrophy6
__3ntr0py__
4 years
RT @prisec_ml: The first seminar of 2022 will be given by Prof. Li Xiong on Wed Jan 26th at 1.30 PM (London time). "Trustworthy Machine Le….
Tweet card summary image
prisec-ml.github.io
0
2
0
@Entrophy6
__3ntr0py__
4 years
RT @prisec_ml: Next seminar: @sarahookr (Google Brain), "The myth of the interpretable, robust, compact, and high performance deep neural n….
0
12
0
@grok
Grok
7 days
What do you want to know?.
613
395
3K
@Entrophy6
__3ntr0py__
4 years
RT @lcavallaro: Interested in ML for (Privacy & Security) of ML research? Check @prisec_ml for upcoming seminars, slack to build a communit….
0
6
0
@Entrophy6
__3ntr0py__
4 years
RT @nirohfeld: Microsoft just patched 4 vulnerabilities we (@wiz_io) recently reported, including a CVSS 9.8 RCE. These vulnerabilities aff….
Tweet card summary image
wiz.io
Wiz Research recently found 4 critical vulnerabilities in OMI, which is one of Azure's most ubiquitous yet least known software agents and is deployed on a large portion of Linux VMs in Azure.
0
122
0
@Entrophy6
__3ntr0py__
4 years
RT @zangobot: Our paper "Adversarial EXEmples: A Survey and Experimental Evaluation of Practical Attacks on Machine Learning for Windows Ma….
Tweet card summary image
dl.acm.org
Recent work has shown that adversarial Windows malware samples—referred to as adversarial EXEmples in this article—can bypass machine learning-based detection relying on static code analysis by...
0
14
0
@Entrophy6
__3ntr0py__
4 years
RT @Jonas_B_K: I have created a free and open-source tool to identify AD attack paths breaking the tier model using BloodHound. Check it ou….
Tweet card summary image
github.com
Identify the attack paths in BloodHound breaking your AD tiering - improsec/ImproHound
0
110
0
@Entrophy6
__3ntr0py__
4 years
RT @laurashin: On Unchained, @woonomic and @n3ocortex break down turbulent times in BTC using on-chain analytics, covering:. - How much Elo….
0
117
0
@Entrophy6
__3ntr0py__
4 years
RT @Hacker0x01: The AWS CTF is going on now! Join at to test your #cloud #hacking skills. #TogetherWeCTFHarder http….
0
43
0
@Entrophy6
__3ntr0py__
4 years
RT @fbpierazzi: At 15:30 CET, in Session 1 of the AISSAI Workshop of @ITASEC_Conf, I am giving a talk on our @IEEESSP 2020 paper on Problem….
0
8
0
@Entrophy6
__3ntr0py__
4 years
RT @XssPayloads: Another weird one (based on Cee triangles ( by @aemkei .ᐁ='',ᐃ=!ᐁ+ᐁ,ᐅ=!ᐃ+ᐁ.ᐊ=ᐁ+{},ᐄ=ᐃ[ᐁ++],ᐆ=.ᐃ[ᐋ=….
0
28
0
@Entrophy6
__3ntr0py__
4 years
RT @shodanhq: Shodan now has more than 4 million users! To celebrate we are offering the membership at a discounted price of $4 for the nex….
0
948
0
@Entrophy6
__3ntr0py__
4 years
RT @orange_8361: I know there are lots of people waiting for the recent Microsoft Exchange pre-auth RCE on our side. This is a short adviso….
Tweet card summary image
proxylogon.com
ProxyLogon - The latest pre-authenticated Remote Code Execution vulnerability on Microsoft Exchange Server
0
434
0
@Entrophy6
__3ntr0py__
5 years
RT @Bank_Security: A Threat Actor is selling a Database of the Italian mobile service provider ho. ( owned by @Voda….
0
458
0
@Entrophy6
__3ntr0py__
5 years
RT @UlisseBO: Thanks to all those who participated and guys from @cesenasec with whom we spent virtually the weekend and above all thanks t….
0
2
0
@Entrophy6
__3ntr0py__
5 years
RT @intigriti: 1️⃣5️⃣.0️⃣0️⃣0️⃣ followers, time to reveal the results of our #EasterChallenge! 🎉.✅ 88 correct solutions.😅 2 unintended solu….
0
5
0
@Entrophy6
__3ntr0py__
5 years
RT @s2lab: We have to limit our physical interactions, but we can enhance our virtual ones: here's the new slick Systems Security Research….
0
3
0
@Entrophy6
__3ntr0py__
6 years
RT @c0mr3x: Found easy xss. 1. Subdomain enumeration.2. S3 bucket with access denied.3. Ffuf found -> /cdn/.4. Ffuf found -> /cdn/proxy.htm….
0
131
0