Grow Your Twitter Free
Want To Grow Your Twitter?
We help other people find and follow you on Twitter.
Key Info:
Started in 2009
Over 4.5 million signups
Country targeting provided
We never auto tweet to your timeline
We never auto follow others
We actively moderate our community
Please Share
Please upgrade your browser to make full use of twiends.  chrome

Rhett Nieto

So I wrote up a blogpost explaining how secret dots printers put on documents outed NSA leaker Reality Winner. blog.erratasec.com/2017/06/how-in…
Retweeted by Rhett Nieto
ETERNALBLUE: Exploit Analysis and Port to Microsoft Windows 10 (whitepaper) [PDF] @JennaMagius @RiskSense risksense.com/download/datas…
Retweeted by Rhett Nieto
GoFetch is out! Take a #BloodHound attack path, a payload, and watch it spread through the network. github.com/GoFetchAD/GoFe…
Retweeted by Rhett Nieto
Find a security policy template for your organization in the SANS Security Policy Resources: sans.org/u/sxw
Retweeted by Rhett Nieto
Based on @mysmartlogon's idea (again him 😋),#mimikatzz can set an arbitrary NTLM to users! (remote Domain or SAM)github.com/gentilkiwi/mim…dI
Retweeted by Rhett Nieto
Great technical walkthrough of the EternalBlue exploit from @RiskSense. A must read for #RE and exploit devs (PDF): risksense.com/download/datas…
Retweeted by Rhett Nieto
Russia takes the worst excesses of capitalism to the extreme, so here's a vending machine in a mall for buying Likes for your Instagram pics
Retweeted by Rhett Nieto
Ho no..you can trigger Samba bug with a command powershell -c [System.IO.File]::Exists('\??\UNC\{srv}\pipe\/mod.so') It becomes ridiculous😅g
Retweeted by Rhett Nieto
oh wow, @knowtheory just pointed out the microdots on the first and late page of the intercept's docs. printer dots kill puppies, folks.
Retweeted by Rhett Nieto
This is the point where you quit your game of Civ 5 and go to the last save point
Retweeted by Rhett Nieto
StarFighters - A Java/VBScript Empire Launcher, which runs within their own embedded PS Host. github.com/Cn33liz/StarFi… @harmj0y @enigma0x3
Retweeted by Rhett Nieto
Safari: Can we disable Java because it is a security vulnerability? Management: No. Safari: *and* to save the environment! Management: Yes!
Retweeted by Rhett Nieto
Red Teams that don't share with Blue Teams are like chefs who won't let their food leave the kitchen because nobody deserves their food.
Retweeted by Rhett Nieto
Starting with Windows #KernelExploitation – part 2 – getting familiar with HackSys Extreme Vulnerable Driver: hshrzd.wordpress.com/2017/06/05/sta…
Retweeted by Rhett Nieto
Remote code execution on Cisco switches via CMP #Vault7. Most still aren't patched. artkond.com/2017/04/10/cis…
Retweeted by Rhett Nieto
On this day in 1983: WarGames was released in movie theaters
Retweeted by Rhett Nieto
Crypto Tokens : A Breakthrough in Open Network Design : medium.com/@cdixon/crypto…
Retweeted by Rhett Nieto
MS-17-010: EternalBlue’s Large Non-Paged Pool Overflow in SRV Driver blog.trendmicro.com/trendlabs-secu…
Retweeted by Rhett Nieto
portSpider - A Lightning Fast Multithreaded Network Scanner Framework With Modules kitploit.com/2017/06/portsp…
Retweeted by Rhett Nieto
getsploit - command line exploit search and download tool (supports Exploit-DB, MSF, Packet Storm, 0daytoday) github.com/vulnersCom/get…
Retweeted by Rhett Nieto
Chinese "Fireball" Malware Infects 250 Million Systems Worldwide theregister.co.uk/2017/06/02/fir…
Retweeted by Rhett Nieto
Exploiting an integer overflow with array spreading (WebKit) phoenhex.re/2017-06-02/arr…
Retweeted by Rhett Nieto
Weak DevOps cryptographic policies increase financial services cyber risk - Help Net - helpnetsecurity.com/2017/06/02/wea…
Retweeted by Rhett Nieto
Operation Bachosens: A detailed look into a long-running cyber crime campaign bit.ly/2rY2NzC
Retweeted by Rhett Nieto
probeSniffer - A Tool for Sniffing Unencrypted Wireless Probe Requests from Devices kitploit.com/2017/06/probes…
Retweeted by Rhett Nieto
#Vault7: CIA Pandemic implant turns file servers into malware infectors securityaffairs.co/wordpress/5963…
Retweeted by Rhett Nieto
Palo Alto Networks #Unit42 researcher uncovers two new Adobe Flash vulnerabilities researchcenter.paloaltonetworks.com/2017/06/unit42…
Retweeted by Rhett Nieto
evilginx : Man-in-the-middle attack framework used for phishing credentials and session cookies of any web service : github.com/kgretzky/evilg…
Retweeted by Rhett Nieto
My walkthrough of an attack and defense on a #Linux CTF/Boot2Root VM themed on Mr Robot. @ossecproject #security inguardians.com/2017/05/31/pro…
Retweeted by Rhett Nieto
Universities have horrible security. Most admin is done by grad students, very high turnover helpnetsecurity.com/2017/06/01/hac…
Retweeted by Rhett Nieto
According to Russian @GroupIB, the #LazarusGroup is directly linked to North Korea. They use a 3-hop anonymiser C&C scheme.
Retweeted by Rhett Nieto
How long before patients start choosing hospitals based on security posture? healthcareitnews.com/news/hospital-…
Retweeted by Rhett Nieto
Still beta but useful during #redteam github.com/Mr-Un1k0d3r/Po… Use PowerShell without invoking PowerShell at all and remain stealth
Retweeted by Rhett Nieto
Analyzing phishing attacks against 500,000 mailboxes at 100 organizations - helpnetsecurity.com/2017/05/31/ana…
Retweeted by Rhett Nieto
Cyphon: An Open Source Incident Management and Response Platform. cyphon.io
Retweeted by Rhett Nieto
Using Patreon to buy Zcash to get NSA exploits to stop the next wave of ransomware infecting hospitals. Future, man motherboard.vice.com/en_us/article/…
Retweeted by Rhett Nieto
Thrilled to announce @IBMSecurity and @CiscoSecurity have teamed up to improve cyber defenses for our customers! fortune.com/2017/05/31/sec…
Retweeted by Rhett Nieto
 
Twiends uses the Twitter™ API, displays it's logo & trademarks, and is not endorsed or certified by them. These items remain the property of Twitter.