CyberWatch (@cyberwatch29) • Hey
Cyber Security & Crypto enthusiast - Posts are mine (for real ^^)
Publications
- Am I alone to not be able to share content ?
- Google cloud users becarefull : exploit discovered in google agenda : an attacker can create inisgial access while he sends an google invitation. more detail here : https://github.com/MrSaighnal/GCR-Google-Calendar-RAT
- Hey 😀
- it has to happen : WORMGPT," a project presented as an alternative to ChatGPT for blackhat activities like malware coding and exploits, was found selling in the hackers forum. The claimed features are quick responses, unlimited characters, privacy focus, and different AI models.
- Incident Response is a huge part of the process in Cyber Secu. This is blog to read for the Windows part : http://windowsir.blogspot.com
- OSINT : Recon tool for LinkedIn : https://github.com/vysecurity/LinkedInt
- This article might interest anyone who has an activity in media, education, small businesses.
Russian intel FSB Center 16 has been using "Snake" implant as a cyber espionage tool for long-term intel collect in 50+ countries.
https://media.defense.gov/2023/May/09/2003218554/-1/-1/0/JOINT_CSA_HUNTING_RU_INTEL_SNAKE_MALWARE_20230509.PDF
- OSINT TOOL : A Curated List of Awesome Telegram OSINT Tools, Sites & Resources
https://github.com/ItIsMeCall911/Awesome-Telegram-OSINT
- Hi @stani.lens, as a cyber engineer, I usually share content from my field: news, tips, cyber tutorials. Recently, I realized that I can no longer publish content on Orb or on Phaver.
According to Phaver, I will even be considered as a spammer or a farmer.. (or so I didn't quite understand :s )
Understanding the need to limit this type of abuse, how can I certify that I am not?
- Built on @memester-xyz.lens
- Hi all, since many weeks i posted cyber news on Phaver without seeing that it was not replicated on Lens, do u want me to share on lens theses posts?
- This one is fun 😂😂
- How LNK Files Are Abused by Threat Actors
[How LNK Files Are Abused by Threat Actors](https://www.intezer.com/blog/malware-analysis/how-threat-actors-abuse-lnk-files/)
LNK files (aka Windows shortcuts) may seem simple, but threat actors can use them to execute other binaries and inflict great harm.
- How LNK Files Are Abused by Threat Actors
[How LNK Files Are Abused by Threat Actors](https://www.intezer.com/blog/malware-analysis/how-threat-actors-abuse-lnk-files/)
LNK files (aka Windows shortcuts) may seem simple, but threat actors can use them to execute other binaries and inflict great harm.
- Becareful: Mysterious leak of Booking.com reservation data is being used to scam customers
[Mysterious leak of Booking.com reservation data is being used to scam customers](https://arstechnica.com/information-technology/2023/02/mysterious-leak-of-booking-com-reservation-data-is-being-used-to-scam-customers/)
Somehow, scammers keep accessing customer reservation details, other private data.
- Hack : How to Create Screen Recorder using Python
[How to Create Screen Recorder using Python](https://morioh.com/p/9ed8250b6eec)
In this video, we will show you how to create a screen recorder using python packages used are. Python is a widely-used general-purpose language, that allows a variety of tasks to be performed. One of them is recording the display screen, that is, creating a screen recorder using the pyautogui module. Below attached is a simple demonstration of this functionality.
- Hack : How to Create Screen Recorder using Python
[How to Create Screen Recorder using Python](https://morioh.com/p/9ed8250b6eec)
In this video, we will show you how to create a screen recorder using python packages used are. Python is a widely-used general-purpose language, that allows a variety of tasks to be performed. One of them is recording the display screen, that is, creating a screen recorder using the pyautogui module. Below attached is a simple demonstration of this functionality.
- IF YOU HAVEN’T PATCHED MICROSOFT PROCESS EXPLORER, PREPARE TO GET PWNED
[Flaw in Microsoft Process Explorer under active attack](https://www.theregister.com/2023/04/24/microsoft_driver_aukill_ransomware/)
AuKill abuses a deprecated tool to disable security processes ahead of the attack
- Cybersecurity : Finding Decoy Dog Toolkit via Anomalous DNS Traffic
[Analyzing DNS Traffic for Anomalous Domains and Threat Detection | Infoblox](https://blogs.infoblox.com/cyber-threat-intelligence/cyber-threat-advisory/dog-hunt-finding-decoy-dog-toolkit-via-anomalous-dns-traffic/)
Learn how Infoblox’s Threat Intelligence Group identified C2 servers in DNS arising from a persistent toolkit called Decoy Dog and how Infoblox can help protect your network from similar attacks.
- Cybersecurity : Tools used to scan suspicious email :
- Hey, frens 👋.
How to grow on Lens: Episode 0 to 500 followers 🔥 is out.
https://luduvigo.substack.com/p/how-to-grow-on-lens-episode-0-to-500
I hope it can be helpful, and I am curious about your feedback.
Let me know what you think about it 🚀.
- Hey 🌿
- Cybersec : penetration testing with gpt
[GitHub - GreyDGL/PentestGPT: A GPT-empowered penetration testing tool](https://github.com/GreyDGL/PentestGPT)
A GPT-empowered penetration testing tool. Contribute to GreyDGL/PentestGPT development by creating an account on GitHub.
- OSINT Most powerful OSINT tool ever
[Most powerful OSINT tool ever](https://artem-maksymov.medium.com/most-powerful-osint-tool-ever-15158f9ffd4f)
Have you ever find yourself obsessively searching for lists of the best OSINT tools, or tools that claim to be able to find everything? Do…
- OSINT: How to find details of an person and may be used to Hack their accounts using “SOSINT”
[How to find details of an person and may be used to Hack their accounts using “SOSINT”](https://medium.com/@abhishekshanmukhan/how-to-find-details-of-an-person-and-may-be-used-to-hack-their-accounts-using-sosint-9ff129890bde)
I believe “digital Foot-Print is an under-rated asset”
- I want to share a game that I follow since the beginning. The game has a token KOMPETE. First I thought it was a scam. Years later, the game is here and it looks fraking great !
Please like and share, DYOR, huge potentiel here ..
[https://kompete.game/](https://kompete.game/)
- ❗️ Google ads push BumbleBee malware used by ransomware gangs
[Google ads push BumbleBee malware used by ransomware gangs](https://www.bleepingcomputer.com/news/security/google-ads-push-bumblebee-malware-used-by-ransomware-gangs/)
The enterprise-targeting Bumblebee malware is distributed through Google Ads and SEO poisoning that promote popular software like Zoom, Cisco AnyConnect, ChatGPT, and Citrix Workspace.
- Hello LENS wonderful start
- When you’re unsure of what color shirt to wear, the outcome is😁💕
#Phaver
#Lens
- GitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!
[GitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported!](https://github.com/blacklanternsecurity/MANSPIDER)
Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported! - GitHub - blacklanternsecurity/MANSPIDER: Spider entire networks for juicy files ...
- Ways to Stay Anonymous Online
1. Use VPN
2. Using TOR Browser
3. Changing your IP Address
4. Changing your Proxy Chain
5. Changing your DNS Server
6. Spoofing your MAC Address
- Can someone build this for @lensprotocol.lens?
Music NFT banners 👀🌊🌿
- Penetration Testing Bible
Explore more than 2000 Hacking Articles saved as PDF
[GitHub - blaCCkHatHacEEkr/PENTESTING-BIBLE: articles](https://github.com/blaCCkHatHacEEkr/PENTESTING-BIBLE)
articles. Contribute to blaCCkHatHacEEkr/PENTESTING-BIBLE development by creating an account on GitHub.
- Social Media OSINT
Resources and tools for:
Facebook
Instagram
Discord
Linkedin
Snapchat
[GitHub - cqcore/Social-Media-OSINT](https://github.com/cqcore/Social-Media-OSINT)
Contribute to cqcore/Social-Media-OSINT development by creating an account on GitHub.
- Cybersecurity "Bypassing Windows Defender (10 Ways)"
[FO-Sec :: Articles :: Bypassing Windows Defender](https://www.fo-sec.com/articles/10-defender-bypass-methods)
- OsintEye - username enumeration & reconnaissance suite
[OsintEye - username enumeration & reconnaissance suite](https://hakin9.org/osinteye-username-enumeration-reconnaisance-suite/)
Username enumeration & reconnaisance suite Supported sites PyPI Github TestPypi About.me Instagram DockerHub Installation Clone project: $ git clone https://github.com/rly0nheart/osinteye.git …
- Android malware infiltrates 60 Google Play apps with 100M install
[Android malware infiltrates 60 Google Play apps with 100M install](https://www.bleepingcomputer.com/news/security/android-malware-infiltrates-60-google-play-apps-with-100m-install/)
A new Android malware named 'Goldoson' has infiltrated the platform's official app store, Google Play, through 60 apps that collectively have 100 million downloads.
- Cybersecurity : Azure AD Security Config Analyzer (AADSCA)
[AzureAD-Attack-Defense/AADSecurityConfigAnalyzer.md at main · Cloud-Architekt/AzureAD-Attack-Defense](https://github.com/Cloud-Architekt/AzureAD-Attack-Defense)
This publication is a collection of various common attack scenarios on Azure Active Directory and how they can be mitigated or detected. - AzureAD-Attack-Defense/AADSecurityConfigAnalyzer.md at mai...
- OSINT : Formulas for Searching Facebook
[Facebook Matrix — Plessas Experts Network](https://plessas.net/facebookmatrix)
Formulas for Searching Facebook
- Do you need a cyber defense search engine?
Onyphe is a search engine for Internet-connected devices similar to Shodan.
[ONYPHE | Attack Surface Management & Cyber Defense Search Engine](https://www.onyphe.io/)
ONYPHE is a Cyber Defense Search Engine dedicated to Attack Surface Discovery & Attack Surface Management. We scan the entire Internet and Dark Web for exposed assets and crawl the links just like a Web search engine. Our data is searchable with a Web form or directly from our numerous APIs.
- Here since (almost) the beginning !
Keep growing Lens Fam ♥️🌱🌱
- $LENS 👑🌝🚀
- Yo!!! Get ready for the upcoming ClubSpace B2B by @jackfrost.lens and @madfinance.lens featuring playlists curated by @arella.lens, Mija, and the OG playlist 🔥. This is going to be massive 🔥!!
This is taking place tomorrow April 14th 2023 at 5pm EST, with 3+ hours of music NFT bangers 🎧. Set your reminders #LensFrens ⏰🥳.
Join the event through this link and all attendees will be able to claim free Party Favor ;
https://www.joinclubspace.xyz/live/madfinance.lens
Click on the link below to get more info about this event;
https://www.eventbrite.com/e/voyage-to-the-stars-the-multidimensional-nftnyc-afterparty-tickets-607747247377
#ClubSpace #MADFI #JackFrost #Lens #Music
- List of places, where you can train your #pentest skills free, legally and safely:
fake vulnerable website/applications
hackers games/challenges
CTFs
open online courses
and more. https://github.com/joe-shenouda/awesome-cyber-skills
- There is a new quick installation guide for Defender for Identity. It's not a complete guide but a really nice overview
[Quick installation guide - Microsoft Defender for Identity](https://learn.microsoft.com/en-us/defender-for-identity/quick-installation-guide)
Learn how to quickly install Microsoft Defender for Identity.
- IT Security Lecture
University lecture on "IT Security" as Open Educational Resources material.
[GitHub - bkimminich/it-security-lecture: University lecture on "IT Security" as Open Educational Resources material](https://github.com/bkimminich/it-security-lecture)
University lecture on "IT Security" as Open Educational Resources material - GitHub - bkimminich/it-security-lecture: University lecture on "IT Security" as Open Educational Res...
- The Practical Linux Hardening Guide
[GitHub - trimstray/the-practical-linux-hardening-guide: This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG).](https://github.com/trimstray/the-practical-linux-hardening-guide)
This guide details creating a secure Linux production system. OpenSCAP (C2S/CIS, STIG). - GitHub - trimstray/the-practical-linux-hardening-guide: This guide details creating a secure Linux producti...
- Samsung workers made a major error by using ChatGPT
- Network pivoting is the process of abusing a compromised machine, connected to multiple networks, to access other networks. This approach comes handy when the attacker wants to target the machines on a different subnet.
[Network Pivoting using Metasploit and Proxychains](https://blog.pentesteracademy.com/network-pivoting-using-metasploit-and-proxychains-c04472f8eed0)
Network pivoting refers to the process of utilizing a compromised machine, that is connected to multiple networks, to get access to other…
- New zero-day (CVE-2023-28252) in Microsoft Windows used in Nokoyawa ransomware attacks
[Nokoyawa ransomware attacks with Windows zero-day](https://securelist.com/nokoyawa-ransomware-attacks-with-windows-zero-day/109483/)
In February 2023, we found a zero-day exploit, supporting different versions and builds of Windows, including Windows 11. This particular zero-day was used by a sophisticated cybercrime group that carries out ransomware attacks.