_Euzebius Profile Banner
Euz | Matthieu πŸ™ Profile
Euz | Matthieu πŸ™

@_Euzebius

Followers
3K
Following
32K
Media
1K
Statuses
8K

Gamer, hacker. Purple teamer at πŸ’œ. Infosec swiss army knife. Don't panic, hack the planet. HTB πŸ‡«πŸ‡· ambassador : euz. I didn't choose InfoSec, it chose me.

127.0.0.42
Joined February 2011
Don't wanna be here? Send us removal request.
@pentest_swissky
Swissky
14 hours
Hack-cessibility: When DLL Hijacks Meet Windows Helpers - @Oddvarmoe https://t.co/urgSR9CCYa
Tweet card summary image
trustedsec.com
0
2
15
@fr0gger_
Thomas Roccia 🀘
1 day
🎁 GenAI x Sec Advent 8 - Nova Hunting Yesterday we talked about the term I coined, Prompt Hunting. The practice you can use to hunt your AI system for adversarial prompts. But how do you actually do that? Glad you ask John, because I built a framework for it: Nova. Nova is
0
3
30
@fr0gger_
Thomas Roccia 🀘
4 days
🎁 GenAI x Sec Advent 5 - MCP Scanner This year MCP broke through in the industry. Model Context Protocol was adopted as the standard to connect external tools to AI systems. But with this adoption the attack surface also increased, with the risk of compromised MCP servers. At
3
8
41
@SpecterOps
SpecterOps
5 days
Whether you’re creating your first agent or refining an existing one, our new Mythic for Developers series, hosted by @its_a_feature_ breaks down development from an operator’s point of view. πŸ‘€ Dive into the playlist and send us your feature requests: https://t.co/8YDydqJoN9
0
16
47
@fr0gger_
Thomas Roccia 🀘
6 days
And if you want to go a step further, here is a design that will help you build your AI incident response playbook πŸ€“
@fr0gger_
Thomas Roccia 🀘
6 days
🎁 GenAI x Sec Advent 3 - AI forensics With AI models deployed everywhere, a new field is emerging: AI Forensics. How do you respond to an AI incident? What your AI system exposes? how do you spot an exploitation attempt? Today I want to share a cool resource from
2
9
27
@vxunderground
vx-underground
6 days
In regards to "cyber influencers", here is a list of people I think are actually great. However, I am extremely biased toward malware related content and/or low-level programming stuff. Unfortunately, some of the really technical people I like also do not post too often. They
65
150
1K
@fr0gger_
Thomas Roccia 🀘
5 days
🎁 GenAI x Sec Advent 4 – MAESTRO MAESTRO is an AI agent threat modeling framework from the Cloud Security Alliance. It is designed for AI agent systems, RAG pipelines, tool calling, and multi agent setups. The framework maps the risks across 7 layers of an agent stack: β€§
3
14
40
@fr0gger_
Thomas Roccia 🀘
8 days
🎁 GenAI x Sec Advent 1 - Visual Threat Intelligence If you follow my work you know I am a big fan of visualization to explain complex or technical content. I used to spend days building the perfect infographic, but now I can generate one in a single shot thanks to LLM
4
22
110
@0xacb
AndrΓ© Baptista
13 days
If you need to generate a target-specific wordlist, make sure to check out @xnl_h4ck3r GAP extension. It will scan for sus parameters and generate you a complete wordlist with one click of a button. See it in action πŸ‘‡
2
43
292
@7h3h4ckv157
7h3h4ckv157
13 days
Once upon a time…. :)
28
69
1K
@fr0gger_
Thomas Roccia 🀘
18 days
πŸ€“ Multiple new additions in PromptIntel: the database that tracks Adversarial Prompts (IoPC)! A short thread with the recent contributors πŸ‘‡
1
4
22
@rekdt
rekdt
24 days
This is all you need to build a million dollar company in 2025.
@CodeByNZ
NZ β˜„οΈ
27 days
This is all you need to build a million dollar company in 2025.
11
50
585
@mpgn_x64
mpgn
26 days
Thrilled to share that the Star Wars NetExec lab I made for @_leHACK_ was fully automated by @LadhaAleem on Ludus/VWmare/VirtualBoxπŸ”₯ Awesome lab with 2AD (rebels&empire), certificats, MSSQL trust, pre2k, and ofc gMSA πŸ‘Ύ Can you find the spy ? GitHub ➑️
Tweet card summary image
github.com
Lab used for workshop and CTF. Contribute to Pennyw0rth/NetExec-Lab development by creating an account on GitHub.
3
80
296
@SpecterOps
SpecterOps
1 month
Think NTLM relay is a solved problem? Think again. @elad_shamir breaks down why it remains one of the easiest, and most effective, attack paths in AD environments. Read more from @helpnetsecurity ‡️
Tweet card summary image
helpnetsecurity.com
NTLM is vulnerable to relay attacks, letting attackers impersonate clients without cracking passwords, making it an easy target.
0
28
135
@HackenProof
HackenProof
1 month
8
31
236
@kmcnam1
sudox
1 month
22
18
210
@rad9800
Rad
1 month
I spent years bypassing security tools as a red teamer. So I built the product to catch me. Launching Nov. 10th.
@deceptiq_
deceptiq
1 month
We are Red Teamers. We know the problem. Here's how we fix It. Launching November 10th. https://t.co/qBgCurNlXo
11
21
277
@letterboxd
Letterboxd
1 month
the countdown begins
39
12K
50K