JoseSelvi Profile Banner
Jose Selvi Profile
Jose Selvi

@JoseSelvi

Followers
5K
Following
286
Media
103
Statuses
6K

Offensive Security & AI/ML enthusiast

Joined January 2010
Don't wanna be here? Send us removal request.
@JoseSelvi
Jose Selvi
3 months
A few weeks ago, I coded an HTTP to MCP bridge, so you can use your favorite HTTP tools to assess the functionality exposed by a remote MCP server. It would be great if you could contribute with your feedback. Thanks!.
0
0
2
@JoseSelvi
Jose Selvi
4 months
I have seen many articles written on MCP and its security, but I think there is still room for some in-depth analysis and for some security tips resulting from it. Even if you have read other articles, you may still learn a thing or two. Do have a read!.
0
1
2
@JoseSelvi
Jose Selvi
4 months
RT @NullMode_: Great post from @JoseSelvi on securing MCP (Model Context Protocol) setups for LLMs 👇. It sparked a….
0
1
0
@JoseSelvi
Jose Selvi
7 months
Have you ever used PyRIT for AI Security Assessments and Red Teaming? Learn how it works under the hood and maintain control of the process by proxying it!.
0
2
4
@JoseSelvi
Jose Selvi
7 months
RT @ctbbpodcast: If you need to spin up a spoofed NTP server, try using Delorean!. Features include:.✅ Flag-based config for custom scenari….
Tweet card summary image
github.com
NTP Main-in-the-Middle tool. Contribute to jselvi/Delorean development by creating an account on GitHub.
0
4
0
@JoseSelvi
Jose Selvi
10 months
Great to see tools like @radareorg and #evilwinrm incorporating AI-powered capabilities. Looking forward to seeing others do the same!.
0
0
2
@JoseSelvi
Jose Selvi
10 months
RT @OscarAkaElvis: Fresh meat! We've created a new Evil-WinRM branch with integrated multiple AI LLM support. New docker image, new gem (ge….
0
6
0
@JoseSelvi
Jose Selvi
10 months
Thanks to @NavajaNegra_AB for giving me the opportunity to share my experience with transformers and AI security with such an amazing audience. It was great to spend a few days meeting and old friends, and also to make new ones! This is why I love this event. See you next year!
Tweet media one
0
6
14
@JoseSelvi
Jose Selvi
11 months
On Oct 3, I'm speaking at @NavajaNegra_AB on "The Power of Transformers." Explore how they work, their unique vulnerabilities, and protection strategies, focusing on prompt injection. See you there! #MachineLearning #Cybersecurity.
0
1
2
@JoseSelvi
Jose Selvi
1 year
RT @wunderwuzzi23: 🔥 Microsoft fixed a high severity data exfiltration exploit chain in Copilot that I reported earlier this year. It was….
0
74
0
@JoseSelvi
Jose Selvi
1 year
RT @clintgibler: 🤖 TL;DR: Every AI Talk from Hacker Summer Camp 2024. There were >60 AI-related talks at @BSidesLV, @BlackHatEvents, and @d….
0
48
0
@JoseSelvi
Jose Selvi
1 year
RT @taviso: This strange tweet got >25k retweets. The author sounds confident, and he uses lots of hex and jargon. There are red flags thou….
0
3K
0
@JoseSelvi
Jose Selvi
1 year
RT @wiz_io: Wiz Research discovered a vulnerability in @Ollama that let them compromise any exposed Ollama server. 😲.📷. This flaw could all….
0
6
0
@JoseSelvi
Jose Selvi
1 year
RT @securestep9: #Google's publishes details of #LLM assisted #vulnerability research project code-named "Naptime" because it allows Google….
0
15
0
@JoseSelvi
Jose Selvi
1 year
RT @xennygrimmato_: Great results on CyberSecEval 2!."Project Naptime", an agent from the Project Zero team at Google, achieves new top sco….
0
4
0
@JoseSelvi
Jose Selvi
1 year
Is refusing to use a LLM the modern equivalent to not wanting to use the spell checker of your favorite text editor? When used properly, it's an amazing tool that nobody should mind using.
0
0
4
@JoseSelvi
Jose Selvi
1 year
RT @virustotal: "YARA is dead, long live YARA-X!" 🎉 . After 15 years, YARA gets a full rewrite in Rust, bringing enhanced performance, secu….
0
166
0
@JoseSelvi
Jose Selvi
1 year
RT @clintgibler: 🙌 YARA is dead, long live YARA-X. @plusvic announces YARA-X, a completely new implementation in Rust. * Better command-lin….
virustotal.github.io
For over 15 years, YARA has been growing and evolving until it became an indispensable tool in every malware researcher’s toolbox.
0
2
0