Mohammed Tanveer Profile
Mohammed Tanveer

@threatpointer

Followers
422
Following
689
Media
50
Statuses
1K

Foodie, backpacker, newbie blogger & Security Engineer @Microsoft~ Opinions expressed are personal!

Bangalore
Joined June 2009
Don't wanna be here? Send us removal request.
@cyb3rops
Florian Roth ⚡️
4 days
“The largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got turned malicious” LinkedIn Post https://t.co/dJ0tlPrSBJ More info on hacker news https://t.co/uncwjtFgxT
Tweet media one
Tweet media two
19
341
1K
@threatpointer
Mohammed Tanveer
16 days
🚀 Just launched ShadowSeek at Black Hat Arsenal 2025! This new AI-powered binary security analysis platform is set to change how we find vulnerabilities in closed-source code. Try here: https://t.co/bqQ1e9zFA8 #BinaryAnalysis #ReverseEngineering #LLM #Ghidra #SecurityResearch
Tweet card summary image
github.com
ShadowSeek - Advanced Binary Security Analysis Platform - threatpointer/ShadowSeek
0
0
1
@JacksonAtkinsX
Jackson Atkins
18 days
NVIDIA research just made LLMs 53x faster. 🤯 Imagine slashing your AI inference budget by 98%. This breakthrough doesn't require training a new model from scratch; it upgrades your existing ones for hyper-speed while matching or beating SOTA accuracy. Here's how it works:
Tweet media one
91
694
4K
@threatpointer
Mohammed Tanveer
16 days
I am sure I need a better cooling system in place for the ML workloads but supper excited to be extacting every ounce of my GPU!
Tweet media one
0
0
0
@threatpointer
Mohammed Tanveer
4 months
Read “Leveraging .INI Files for Code Execution on Windows: Techniques Used by Malware and Adversaries“ on Medium:
Tweet card summary image
medium.com
.ini files are traditionally used for configuration purposes on Windows systems, storing application settings in a structured key-value…
0
0
0
@threatpointer
Mohammed Tanveer
6 months
Just published my latest blog on MCP & Security! Check it out and let me know your thoughts. 🚀🔒 https://t.co/efcp1OHp2r #CyberSecurity #MCP #infosec #AI
Tweet card summary image
medium.com
What is Model Context Protocol (MCP)?
1
0
0
@threatpointer
Mohammed Tanveer
1 year
I'm attending #BlueHat India. Hit me up if you are around!
0
0
0
@hackerfantastic
hackerfantastic.x
2 years
SignToolEx - code sign things with expired (leaked) certificates without adjusting system clock using Microsoft Detours. https://t.co/2WP1wkEwdW
Tweet media one
3
120
384
@tmpout
tmp.0ut
2 years
tmpout vol3 - article a day #14 "rain king - silent syscall hooking on arm64 linux via patching svc handler" wintermute shows us an interesting way of hooking syscalls that isn't commonly detected! read here: https://t.co/owHhPmbNjF
Tweet media one
0
15
59
@7h3h4ckv157
7h3h4ckv157
2 years
Hey Hackers, Here's the EDR and AV Bypass Content Thread! 🧵 👇 #infosec #Hacking #Pentesting #redteam
14
145
540
@tmpout
tmp.0ut
2 years
Check it out, it's tmp.0ut Volume 3! https://t.co/Gm9erN8hTJ
Tweet media one
20
413
1K
@leak_ix
LeakIX
2 years
🚨🚨🚨 Whatever you were thinking about CVE-2023-20198 (#Cisco IOS EX) it's 100x worst. We used @TalosSecurity IOC check and found ~30k implants. That's 30k devices infected (routers, switches, VPNs), under the control of threat actors. That's excluding rebooted devices.
Tweet media one
17
159
427
@Blackmond_
Evilcry_
2 years
Poor man's guide to de-obfuscating VMProtect's : Discovery: https://t.co/xD3ZGtnSCB… (1/3) Resolution: https://t.co/6rrgxVavPU… (2/3) Import Recontruction: https://t.co/arHaZ21rYz… (3/3)
0
37
111
@omarsar0
elvis
2 years
From word vectors to Reinforcement Learning from Human Feedback... Stanford's "Natural Language Processing with Deep Learning" course is one of the most relevant and best AI/ML courses today. It's just amazing how much knowledge and content this course pushes out every year.
Tweet media one
19
351
2K
@ItakGol
Itamar Golan 🤓
2 years
This is scary. 😱 The MOTHER of all LLM Jailbreaks & Prompt injections. "Universal and Transferable Adversarial Attacks on Aligned Language Models" 🌐🔒 --- TL;DR --- This research & code introduces a fascinating method called "Universal and Transferable Adversarial Attacks
Tweet media one
Tweet media two
Tweet media three
39
311
1K
@pashovkrum
pashov
2 years
This might be the single best repository to learn about smart contract hacks that happened in the DeFi ecosystem so far and even reproduce them using Foundry. Close to 200 hacks/incidents are listed here. 10x @1nf0s3cpt https://t.co/yg3GRQhirQ
Tweet card summary image
github.com
Reproduce DeFi hacked incidents using Foundry. Contribute to SunWeb3Sec/DeFiHackLabs development by creating an account on GitHub.
22
168
643
@threatpointer
Mohammed Tanveer
2 years
Couldn't agree more with Gokul Rajaram: Next nine months will lead to company failures, shutdowns, down rounds: Gokul Rajaram - The Economic Times
Tweet card summary image
economictimes.indiatimes.com
​​Rajaram, dubbed the ‘Godfather of Google's AdSense’, who later became product director of ads at Facebook, is also an angel investor in domestic startups with a portfolio comprising Cred, Curefit,...
0
0
0