nitr0usmx Profile Banner
Alejandro Hernández Profile
Alejandro Hernández

@nitr0usmx

Followers
5K
Following
34K
Media
6K
Statuses
39K

✇ Cybersecurity ✧ Director of Services at @IOActive ✎ Stock Trading ◮ Spanglish

San Cristóbal, Chiapas, México
Joined February 2011
Don't wanna be here? Send us removal request.
@naiivememe
naiive
3 days
the man, the myth, the legend
518
3K
31K
@nitr0usmx
Alejandro Hernández
2 days
(CISSP == infosec) != hacking 🥷
@wh1t3h4ts
root㉿kali
4 days
what's one advice you can give to a younger self or a newbie in cybersecurity
0
0
2
@GamblingMemez
Gambling is Life
3 days
🤣
19
75
995
@KobeissiLetter
The Kobeissi Letter
6 days
This is wild: A map of OpenAI's recent partnerships. Now one of the largest companies in the world, worth over $500B, still owned by a non-profit parent. What's next?
258
1K
5K
@nitr0usmx
Alejandro Hernández
6 days
Thanks to this sublime machines we have shaped the digital world to this day 🤖 Unveiling High NA EUV | ASML
0
0
0
@nitr0usmx
Alejandro Hernández
8 days
Hacker profesional ✔️
0
0
5
@prathamgrv
pdawg
11 days
as much as i hate to admit this
119
481
6K
@nitr0usmx
Alejandro Hernández
10 days
📋 A Guide to Directory Traversal Vulnerability in 2024 by @Certcube Labs
0
0
2
@nitr0usmx
Alejandro Hernández
12 days
"Semiconductor Industry Jargon" by @IOActive 💻 https://t.co/QheRYj0Xe2
2
0
0
@IOActive
IOActive, Inc
13 days
"With the advent of electronic trading platforms and networks, the exchange of financial securities now is easier and faster than ever; but this comes with inherent risks." Check out the research Alejandro Hernández (@nitr0usmx). https://t.co/gllVrwAITH
0
1
2
@elconde_nad0
El CondeNado
14 days
Un adicto...al trabajo
166
5K
38K
@Officialwhyte22
Winston Ighodaro
14 days
I found a rootkit hiding in https://t.co/G8VK6WQTYp.0, silently connecting to a command-and-control. The malware used a reverse SSH tunnel to exfiltrate browser credentials, logins, and screenshots, while quietly pinging a Telegram bot channel.
17
94
526
@azuk4r
sugar
15 days
new backdoor method that leverages nmap with setuid permissions to execute commands as root through a Lua-loaded C library, I hope you enjoy it! here is the url: https://t.co/QjWPWT6PNw special thanks to @hackerfantastic for giving me some pointers to make this work
11
89
488
@pfiatde
pfiatde
14 days
If you place a dll in a protected folder it will get executed? *mild shock* ... How can this get a CVE? This is a Proxy dll.
@The_Cyber_News
Cyber Security News
14 days
🚨 Notepad++ DLL Hijacking Vulnerability Let Attackers Execute Malicious Code Read more: https://t.co/66WEsWKeG1 A newly discovered DLL hijacking vulnerability in Notepad++, the popular source code editor, could allow attackers to execute arbitrary code on a victim's machine.
19
69
633
@alightinastorm
robot
17 days
how software looks when electrical engineers think they can do what we do
675
568
13K
@TheAhmadOsman
Ahmad
17 days
vibe coders, secure your systems with this tool in 1 easy step
216
443
9K
@Hesamation
ℏεsam
18 days
The biggest application of MCP servers: building them
234
601
9K