Agostino Panico @localhost
@Van1sh_BSidesIT
Followers
456
Following
782
Media
33
Statuses
1K
I'd rather die on my feet, than live on my knees. E. Zapata #BSidesRoma and #BSidesMilano Organizer ๐ค ๐
127.0.0.1
Joined September 2011
Wow, what an amazing time speaking at #DEFCON33! A huge thank you to everyone who came to my talks on ebpf and vm-protected analysis. I loved the energy and questions! ๐คฉ Big props to the #DEFCON Goons for all their hard work! Until next time! #Cybersecurity #Hacking @defcon
2
0
4
A special shoutout to the many ๐ช๐บEuropean cyber researchers presenting their work at #DEFCON, you were awesome. ๐ณ๐ฑ@_dirkjan @John_Fokker ๐ฎ๐น@Van1sh_BSidesIT ๐ซ๐ท@christophetd @fr0gger_ @kalimer0x00 ๐ง๐ช@RedByte1337 ๐จ๐ฟ@marektoth ๐ฌ๐ง@_mattmuir @johnnyspandex @buffaloverflow +many others
3
5
33
I've recently reactivated the Spiderfoot project, focusing on refining its functionality. After addressing initial bugs and making adjustments, I've integrated new modules, such as the multiscan feature with cross-scan correlation. https://t.co/pzhMudp4OH
#OSINT @spiderfoot
github.com
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage - poppopjmp/spiderfoot
0
2
7
I've recently reactivated the Spiderfoot project, focusing on refining its functionality. After addressing initial bugs and making adjustments, I've integrated new modules, such as the multiscan feature with cross-scan correlation. https://t.co/pzhMudp4OH
#OSINT @spiderfoot
github.com
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface. Codename Mirage - poppopjmp/spiderfoot
0
2
7
Excited to share the schedule for my talks @defcon #DEFCON33 #eBPF #RE #malware #exploit #kernel #CyberSecurity #hackersummercamp #reversing #Hivemind #taint #lasvegas
1
5
7
Excited to share the schedule for my talks @defcon #DEFCON33 #eBPF #RE #malware #exploit #kernel #CyberSecurity #hackersummercamp #reversing #Hivemind #taint #lasvegas
1
5
7
Class prep @brucon in full progress ๐คฉ๐ช๐ผ Corelan stack = Step 1๏ธโฃ on your journey to Corelan Certification. โ
You can still sign up for Stack classes in US and Switzerland this year. ๐๐ผ https://t.co/DckcMarpVW Pls share ๐๐ผ๐๐ผ #cced #corelan #stack
0
5
11
1
4
7
Corelan Day 4 @corelanc0d3r @BSidesItalia @BSidesRoma : All about the stack! Tackling buffer overflows and understanding how things really work under the hood. #ropchain #aslr #Corelan #ExploitDev #InfoSec #StackSmashing We are rocking!!
0
5
6
YES! ๐ฅ The legendary Corelan (@corelanc0d3r) exploit development training is happening in ROME! ๐ฎ๐น Absolutely stoked about this opportunity right here in Italy. Time to level up those #ExploitDev skills! ๐ช #Corelan #CyberSecurity #InfoSec #Reversing #Rome #Hacking #Cyber
0
4
6
0
5
13
New year giveaway! I am giving away 1 seat each for @AlteredSecurity's upcoming Attacking and Defending AD (CRTP) and Attacking and Defending Azure (CARTP) bootcamps starting on 10th and 11th January 2025. Repost, Like and Comment to participate. I will share random winners on
328
321
450
The best PE explorer (and editor) tool out there if you haven't known yet ๐
New #PEbear is out (v0.7.0) - with new icon, Qt6, ARM64 support and more goodies ๐! Check it out: https://t.co/Dm1sVaOqAl
1
4
31
The first argument of a command line, argv[0], is usually the process name or path. Unsurprisingly, you can nearly always set this to an arbitrary value. This can be abused to bypass detections, deceive analysts or corrupt EDR data. Full blog post here๐ https://t.co/4HJkyH0PQo
6
74
173
Our @defcon recap video is live! ๐ฅณ Thank you to everyone who attended the village this year at DEF CON! Another huge thank you to our core team, sponsors, volunteers, goons, and DEF CON! See you all next year! ๐ https://t.co/aDoqYhwk2V
4
14
59
Unisciti a noi per celebrare i 50 anni di D&D con una sessione epica al MOCA2024! Posti limitati, iscriviti subito per partecipare: https://t.co/FpDcKxwCID ๐
14 Settembre - h 21:00 Sarร un'avventura unica dove il #fantasy incontra il #digitale! Info: https://t.co/HoB55rnfAv
0
7
10
It's time to take a closer look at CVE-2024-38063 (Windows TCPIP RCE). I usually don't post partial analysis but since most available info is unreliable I'll do my best to try and shed some light. This time I'll focus on my workflow and thought process as we go. ๐งต
11
219
758
#FF Last week I met several cyber heroes in person, including @Oddvarmoe @bohops @xenosCR @ConsciousHacker @fr0gger_ @evstykas @LloydLabs @infosecb @Mr_Forensics @theg3ntl3m4n @Teach2Breach @Van1sh_BSidesIT @danielhbohannon - if you didn't already, give them a follow! ๐ฅ
7
3
18
Support privacy, free speech, and digital creators! @EFF members have fought for rights online for decades, and it's more important now than ever before.
0
0
1