@rammolina Profile picture

Ramiro Molina

@rammolina

Computer Engineer. Pentester.

Joined June 2010
Similar User
Omkar Magar photo

@Omkar7505

Sandesh Kurhade Patil photo

@ksandesh1996

Md. Merajus Salekeen photo

@MerajusMd

BharadwajDJ photo

@BharadwajDj

Juan Arias photo

@realJuanArias

Dolphin photo

@Dolphin01684386

Pau Bolivar photo

@Paubolivars

Miriam Iris Bidyeran photo

@mbidyeran

Trey 𝕏 photo

@01dguy

Maca Ordenavia photo

@macaordenavia

Ramiro Molina Reposted

Without notice, X has opted all users into training its "Grok" AI Model. To turn off this setting and stop your "posts, interactions, inputs, and results" from being used for training and fine-tuning Grok, visit x.com/settings/grok_… and uncheck the checkbox.

Tweet Image 1

Ramiro Molina Reposted

Leaked footage of CrowdStrike's legal department this morning


Hahaha

This post is unavailable.

Ramiro Molina Reposted

Sigh.

Tweet Image 1

Ramiro Molina Reposted

Dolphins holding hands 🐬💕🐬

From maa haniff

Ramiro Molina Reposted

A GitHub flaw lets attackers upload executables that appear to be hosted on a company's official repo, such as Microsoft's—without the repo owner knowing anything about it. The following URLs, for example, make it seem like these ZIPs are present on Microsoft's source code repo:…

Tweet Image 1
Tweet Image 2

Ramiro Molina Reposted

The xz fiasco has shown how a dependence on unpaid volunteers can cause major problems. Trillion dollar corporations expect free and urgent support from volunteers. @Microsoft @MicrosoftTeams posted on a bug tracker full of volunteers that their issue is "high priority"

Tweet Image 1

Ramiro Molina Reposted

[#HackTip ⚒] Looking for a legitimate way of achieving #persistence on Windows? How about #AnyDesk silent deployment? 😉

Tweet Image 1

Ramiro Molina Reposted

The xz package, starting from version 5.6.0 to 5.6.1, was found to contain a backdoor. The impact of this vulnerability affected Kali between March 26th to March 29th. If you updated your Kali installation on or after March 26th, it is crucial to apply the latest updates today.


Ramiro Molina Reposted

New: inside the underground site where "neural networks" churn out fake IDs - I tested, made two IDs in minutes - used one to successfully bypass the identity verification check on a cryptocurrency exchange - massive implications for crime, cybersecurity 404media.co/inside-the-und…

Tweet Image 1

Ramiro Molina Reposted

The attackers were very sophisticated. They were drinking expensive wine and listening to classical music while they exfiltrated the data.


🎉🎉🎉 happy times!


Ramiro Molina Reposted
Tweet Image 1

Ramiro Molina Reposted

Next beacon name be like :

Tweet Image 1

This is utter crap for AV advice from Microsoft It's bad enough that Teams still runs in a user-writable location (AppData), but lets combine that with AV exclusions AND not specify path based vs process based exclusions I would highly advise against path based exclusions here



Ramiro Molina Reposted

🔥 New blogpost 🔥 Running PEs inline without a console. You now can, for example, run PowerShell in CobaltStrike and obtain its output without spawning any process (including conhost.exe) coresecurity.com/core-labs/arti…


Ramiro Molina Reposted

sometimes in hardened AD env they disable (actually remove) SeDebugPrivilege globally (via GPO) in order to prevent malicious things targeting process memory (like token stealing, etc.) even as local admin. good (or bad) news is that the bypass is easy: pentest.party/notes/windows/…


Great week at ⁦@ekoparty⁩. Best time hanging with friends.

Tweet Image 1

Ramiro Molina Reposted

The new Teams splash screen warning for external participants is nice and a big improvement (after almost 2 years), but can be bypassed quite easily by using the meeting-chat. Details on my blog. badoption.eu/blog/2023/09/2…

Tweet Image 1

Ramiro Molina Reposted

New blog post about an adventure I had with pre-created computer accounts. Let me tell you, old computer accounts can be fun! Ended up creating an impacket script and a PR to the SharpHound ingestor as part of my adventure 🔥 Feedback is appreciated trustedsec.com/blog/diving-in…


Loading...

Something went wrong.


Something went wrong.