
Alberto Gª Illera
@algillera
Followers
2K
Following
3K
Media
25
Statuses
1K
Red Teaming & Friends
San Francisco
Joined December 2010
@francisco_oca and I have just released Ponce v0.3 version. Runs on any IDA version >=7.0 on Windows, Linux and OSx. Symbolic Execution within IDA just one click away. Ponce now supports ARM binaries and a large list of new features that you can find here:.
github.com
Previous release was incorrectly using an old commit
1
12
16
RT @degrigis: You are probably gonna hate me for the title of this blogpost, but, here is a quick peek into one of the most surprising comp….
0
28
0
RT @cl4sm: Checkout the Post-Mortem of our system ARTIPHISHELL (by @degrigis and I)! We look at a few issues that kept @shellphish from a t….
0
18
0
The second post in my AIxCC series is out. This one breaks down the rules and scoring—key to understanding why teams built their systems the way they did. It also analyzes teams results and why some of them found less vulns but were scored higher!
0
8
25
RT @wunderwuzzi23: 👉 Episode 21: Hijacking Windsurf. How Prompt Injection Leaks Developer Secrets. The agent cannot protect your private co….
0
39
0
Back at Defcon after years away. The highlight? DARPA’s AI Cyber Challenge (AIxCC). It blew me away—and inspired me to launch a new personal blog. I'm doing a series of posts about AIxCC. The first one is out:
1
18
106
RT @pr0cf51: Here’s the source code of our #AIxCC winning team @TeamAtlanta24, enjoy! . More things TBA.
github.com
Contribute to Team-Atlanta/aixcc-afc-atlantis development by creating an account on GitHub.
0
37
0
RT @mbrg0: we hijacked microsoft's copilot studio agents and got them to spill out their private knowledge, reveal their tools and let us u….
0
905
0
Is there any playlist with the songs played between talks at @BlackHatEvents. They are soooo cool!.
0
0
0
Really cool talk at Blackhat to train models on a specific task, in this case malware development bypassing AVS. Single purpose model are way better than general ones. Model was released:.
outflank.nl
Training specialized LLMs with reinforcement learning with verifiable rewards (RLVR), using evasive malware development as a case study.
0
0
2
RT @JeremiahDJohns: One of my all-time favorite type of videos is pre-fame bands playing their extremely famous songs to a tiny room of peo….
0
14K
0
RT @HashemGhaili: Prompt Theory (Made with Veo 3). What if AI-generated characters refused to believe they were AI-generated? https://t.co/….
0
4K
0
RT @robertswiecki: Fuzzing Windows Defender in the Honggfuzz+IntelPT (hardware) mode. by @buherator.
0
62
0
RT @dillon_franke: Thrilled to announce my new Project Zero blog post is LIVE! 🎉 I detail my knowledge-driven fuzzing process to find sandb….
0
105
0
RT @vitrupo: Jim Fan says NVIDIA trained humanoid robots to walk and move like humans -- zero-shot transfer from simulation to the real wor….
0
684
0
RT @dennis_kniep: Wrote about a novel technique that leverages the well-known Device Code #phishing approach. It dynamically initiates the….
denniskniep.github.io
TL;DR; This is a novel technique that leverages the well-known Device Code phishing approach. It dynamically initiates the flow as soon as the victim opens the phishing link and instantly redirects...
0
68
0
RT @nicksdjohnson: Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vu….
0
6K
0
RT @luijait_: Cybersecurity AI (CAI) - HackableII - 9 minutos y 45 segundos . 🔍 1/7 Fase Inicial: Reconocimiento del objetivo 192.168.2.11E….
0
6
0