
Tiago Sequeira (@[email protected])
@_x13
Followers
264
Following
323
Media
337
Statuses
3K
hacker | researcher | engineer
Portugal
Joined February 2010
RT @_josehelps: now has SIEM queries and a tool section for those looking to operationalize the data. Thanks to @Cy….
0
43
0
Leaked North Korean Linux Stealth Rootkit Analysis
sandflysecurity.com
Leaked North Korean Linux Stealth Rootkit Analysis from Phrack Magazine
0
0
0
RT @SEKTOR7net: Modern obfuscation techniques - a great weekend read. Master's thesis (by Roman Oravec) investigates various common obfusc….
0
141
0
EternalBlue Series Part 1: Introduction | h3xduck blog
h3xduck.github.io
Four years ago (we are in 2021 at the time of writing) the Shadow Brokers hacker group leaked what has come to be one of the most famous yet infamous vulnerabilities of all times. You may know it as...
0
0
1
Structured Vs. Unstructured Threat Intelligence: The Ultimate Guide - Kraven Security
kravensecurity.com
Confused by threat intelligence formats? This guide breaks down the differences and importance of both structured and unstructured threat intelligence.
0
0
0
Introducing Unit 42’s Attribution Framework
unit42.paloaltonetworks.com
Peel back the layers on Unit 42's Attribution Framework. We offer a rare inside view into the system used to ultimately assign attribution to threat groups.
0
0
0
Hayabusa + Velociraptor -> Timesketch: How to build a SuperTimeline | Durok Home
freedurok.github.io
A practical guide to building forensic timelines from Windows systems using Hayabusa, Velociraptor, and Timesketch. Learn how to acquire artifacts, generate super-timelines, and visualize evidence...
0
1
2
How Israel and Iran brought cyber conflict to centre stage
bindinghook.com
From drone strikes to cryptocurrency heists, the June clash between Israel and Iran saw new battle lines drawn – proving that cyberattacks now shape modern warfare as much as missiles and jets.
0
1
1
Azure Front Door AiTM Phishing — AiTM Feed by Lab539
aitm-feed.com
We take a technical deep dive into a sophisticated set of Adversary in The Middle infrastructure utilising Azure Front Door, custom crypto, various redirects off of legitimate services as well as...
0
0
0
@"Measuring Real-World DDoS Impact: Real-Time Monitoring of NoName057(16) Campaigns"on @LinkedIn.
0
0
0
Hangro: Investigating North Korean VPN Infrastructure Part 2 | North Korean Internet
nkinternet.com
If you haven’t seen part 1, it provides an overview of the service as well as the domains and IPs supporting the infrastructure. Continuing my analysis of the Hangro VPN IPs and service I started q…
0
1
3