Van1sh_BSidesIT Profile Banner
Agostino Panico @localhost Profile
Agostino Panico @localhost

@Van1sh_BSidesIT

Followers
456
Following
782
Media
33
Statuses
1K

I'd rather die on my feet, than live on my knees. E. Zapata #BSidesRoma and #BSidesMilano Organizer ๐Ÿค ๐Ÿ˜Ž

127.0.0.1
Joined September 2011
Don't wanna be here? Send us removal request.
@Van1sh_BSidesIT
Agostino Panico @localhost
3 months
Wow, what an amazing time speaking at #DEFCON33! A huge thank you to everyone who came to my talks on ebpf and vm-protected analysis. I loved the energy and questions! ๐Ÿคฉ Big props to the #DEFCON Goons for all their hard work! Until next time! #Cybersecurity #Hacking @defcon
2
0
4
@Wietze
Wietze
3 months
A special shoutout to the many ๐Ÿ‡ช๐Ÿ‡บEuropean cyber researchers presenting their work at #DEFCON, you were awesome. ๐Ÿ‡ณ๐Ÿ‡ฑ@_dirkjan @John_Fokker ๐Ÿ‡ฎ๐Ÿ‡น@Van1sh_BSidesIT ๐Ÿ‡ซ๐Ÿ‡ท@christophetd @fr0gger_ @kalimer0x00 ๐Ÿ‡ง๐Ÿ‡ช@RedByte1337 ๐Ÿ‡จ๐Ÿ‡ฟ@marektoth ๐Ÿ‡ฌ๐Ÿ‡ง@_mattmuir @johnnyspandex @buffaloverflow +many others
3
5
33
@Van1sh_BSidesIT
Agostino Panico @localhost
4 months
I've recently reactivated the Spiderfoot project, focusing on refining its functionality. After addressing initial bugs and making adjustments, I've integrated new modules, such as the multiscan feature with cross-scan correlation. https://t.co/pzhMudp4OH #OSINT @spiderfoot
Tweet card summary image
github.com
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage - poppopjmp/spiderfoot
0
2
7
@Van1sh_BSidesIT
Agostino Panico @localhost
4 months
I've recently reactivated the Spiderfoot project, focusing on refining its functionality. After addressing initial bugs and making adjustments, I've integrated new modules, such as the multiscan feature with cross-scan correlation. https://t.co/pzhMudp4OH #OSINT @spiderfoot
Tweet card summary image
github.com
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage - poppopjmp/spiderfoot
0
2
7
@Van1sh_BSidesIT
Agostino Panico @localhost
5 months
1
5
7
@Van1sh_BSidesIT
Agostino Panico @localhost
5 months
1
5
7
@corelanc0d3r
ฯ‚เนะณั”ษญเธ„เธ ฯ‚0เน”3ะณ ([email protected])
7 months
Class prep @brucon in full progress ๐Ÿคฉ๐Ÿ’ช๐Ÿผ Corelan stack = Step 1๏ธโƒฃ on your journey to Corelan Certification. โœ… You can still sign up for Stack classes in US and Switzerland this year. ๐Ÿ‘‰๐Ÿผ https://t.co/DckcMarpVW Pls share ๐Ÿ™๐Ÿผ๐Ÿ™๐Ÿผ #cced #corelan #stack
0
5
11
@corelanconsult
Corelan Consulting & Training
7 months
Day 4 already ๐Ÿ’ช๐Ÿผ๐Ÿ”ฅ๐Ÿ‘Œ๐Ÿผ @BSidesRoma #corelan #stack #road2cced #cced
1
4
7
@BSidesRoma
BSidesRoma
7 months
Corelan Day 4 @corelanc0d3r @BSidesItalia @BSidesRoma : All about the stack! Tackling buffer overflows and understanding how things really work under the hood. #ropchain #aslr #Corelan #ExploitDev #InfoSec #StackSmashing We are rocking!!
0
5
6
@BSidesRoma
BSidesRoma
7 months
YES! ๐Ÿ”ฅ The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! ๐Ÿ‡ฎ๐Ÿ‡น Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! ๐Ÿ’ช #Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber
0
4
6
@corelanconsult
Corelan Consulting & Training
7 months
0
5
13
@nikhil_mitt
Nikhil Mittal
10 months
New year giveaway! I am giving away 1 seat each for @AlteredSecurity's upcoming Attacking and Defending AD (CRTP) and Attacking and Defending Azure (CARTP) bootcamps starting on 10th and 11th January 2025. Repost, Like and Comment to participate. I will share random winners on
328
321
450
@mrgretzky
Kuba Gretzky
1 year
The best PE explorer (and editor) tool out there if you haven't known yet ๐Ÿ˜€
@hasherezade
hasherezade
1 year
New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies ๐Ÿ˜Š! Check it out: https://t.co/Dm1sVaOqAl
1
4
31
@Wietze
Wietze
1 year
The first argument of a command line, argv[0], is usually the process name or path. Unsurprisingly, you can nearly always set this to an arbitrary value. This can be abused to bypass detections, deceive analysts or corrupt EDR data. Full blog post here๐Ÿ‘‰ https://t.co/4HJkyH0PQo
6
74
173
@zodiacon
Pavel Yosifovich
1 year
Creating a Kernel Object type part 2: https://t.co/zXoBf35oFb
1
48
176
@RedTeamVillage_
RedTeamVillage
1 year
Our @defcon recap video is live! ๐Ÿฅณ Thank you to everyone who attended the village this year at DEF CON! Another huge thank you to our core team, sponsors, volunteers, goons, and DEF CON! See you all next year! ๐ŸŒŸ https://t.co/aDoqYhwk2V
4
14
59
@MetroOlografix
Metro Olografix
1 year
Unisciti a noi per celebrare i 50 anni di D&D con una sessione epica al MOCA2024! Posti limitati, iscriviti subito per partecipare: https://t.co/FpDcKxwCID ๐Ÿ“…14 Settembre - h 21:00 Sarร  un'avventura unica dove il #fantasy incontra il #digitale! Info: https://t.co/HoB55rnfAv
0
7
10
@f4rmpoet
farmpoet
1 year
It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. ๐Ÿงต
11
219
758
@Wietze
Wietze
1 year
#FF Last week I met several cyber heroes in person, including @Oddvarmoe @bohops @xenosCR @ConsciousHacker @fr0gger_ @evstykas @LloydLabs @infosecb @Mr_Forensics @theg3ntl3m4n @Teach2Breach @Van1sh_BSidesIT @danielhbohannon - if you didn't already, give them a follow! ๐Ÿ”ฅ
7
3
18
@Van1sh_BSidesIT
Agostino Panico @localhost
1 year
Support privacy, free speech, and digital creators! @EFF members have fought for rights online for decades, and it's more important now than ever before.
0
0
1