Silas Cutler // p1nk
@silascutler
You may know me from your logs #hacks Research @Censys Advisor @IST_org & #DEVSEC Built @Only_Scans, @mal_share, #KeyDrop
Samples from APT Dropping Elephant are uploaded @abuse_ch bazaar.abuse.ch/browse/tag/Dro…
The Arctic Wolf Labs team has uncovered a new campaign by APT group Dropping Elephant targeting major Turkish defense contractors and weapons manufacturers. Learn more in our latest blog: ow.ly/xLih50WueNn #HypersonicEspionage #TurkeyPakistan #DroppingElephant #Türkiye
The Scavenger threat actors managed to compromise num2words. The maintainers removed the malicious package, and the threat actors published another package. Ouch. The package has ~700k weekly downloads. So that's a lot of exposure.
It’s that time of year: IST is headed to #defcon33, @BSidesLV & #BHUSA! We join our colleagues in Las Vegas to share research, learn from technical experts & connect with our growing network of stakeholders from across the cyber ecosystem. 📍Here’s where you can find IST and…
x.com/MalwareVillage…
Klaus Agnoletti(@klausagnoletti) and Glen Sorensen will be hosting “Malware & Monsters” at #MalwareVillage @DEFCON 33!📣 This workshop teaches experienced D&D gamers the skills needed to facilitate epic learning sessions using the M&M framework. Sign-up: forms.gle/bNC21pHZZsXZM3…
Modern Binary Exploitation by @RPISEC. This was a university course developed and run solely by students to teach skills in vulnerability research, reverse engineering, and binary exploitation. github.com/RPISEC/MBE
lol ok but like… the phrase "my own Discord server" is peak delusion rn 🫠 Babygirl… that shit is hosted on honeypot type shit dot CN. You don’t own a damn thing but the trauma you typed into it. (╯°□°)╯︵ ┻━┻
Phrack Magazine 40th Anniversary Challenge Coin - Charity Auction! @phrack 100% of the proceeds go to @EFF cDc/r00t Microsoft MSRC challenge coins, cDc patches, stickers, and most importantly an @attritionorg 25th Anniversary Coin. +r00t party infoz. ebay.com/itm/1772943239…
x.com/dustrial/statu…
Cybercrime Champion Hoodie Back in stock for the fall... of civilization
Thank you @mal_share for being a Bronze sponsor for @MalwareVillage @DEFCON 33! 🙏 Interested in learning more about their company? Visit: malshare.com #MalwareVillage #DC33
🏠️ BIC Village @ DEF CON 33 🏴☠️ Calling all GOONS! Stop by the BIC Village for a special commemorative piece, *while supplies last* Thank you for all you do! blacksincyberconf.com/alaafia #AlaafiaState #BlacksInCyber #BICVillage #BIC_Village #HBCUCyber
Chat, I don't wanna brag, but Black Mass Volume III is going crazy - Number 1 best-seller on Amazon (trending). We managed to pass the "Cybersecurity for Seniors" series - Insane amounts of cash flowing in. We might buy a Porsche or two from the sales
Join the @Defcon Bike Ride. 25 miles in the desert at 7am on Friday Aug 8th! Deets here: cycleoverride.org/2025-defcon-33…
Along with a group of other researchers, I've been tracking attacks from the DDoSia participatory DDoS botnet operated by NoName0157(16) . Targets of this botnet have been primarily Ukrainian, NATO and other European targets. Today, we published collected logs from tracking…


Google Threat Intel is tracking widespread exploitation of on-prem SharePoint vulns: CVE-2025-53770 & CVE-2025-53771. This is a severe threat. We recommend patching, threat hunting and rotating keys. Learn more, incl. how to detect this threat in Google SecOps:…
Nothing too exciting by APT41 🇨🇳 here IMO, using Impacket, CobaltStrike, Mimikatz, Pillager, RawCopy, Neo-reGeorg Using a compromised SharePoint server for C2 is interesting I guess, especially with this new ToolShell exploit for SharePoint servers securelist.com/apt41-in-afric…
Black Mass Volume III is on it's final stages of development. Our publisher has received it. If they don't yell at us and be mean, Black Mass Volume III will become available Friday, July 25th, 2025. It will be available online as a PDF for free. You can buy a physical copy for…
This year will be the 30th @BSidesPyongyang, come celebrate our 30th anniversary at #BSidesPyongyang2025 👏👏👏
I’ll be keynoting “Break Systems, Not Promises: I Promised to do a Keynote at DEF CON” at @DEFCON 33 @MalwareVillage on Friday, Aug 8 2025! 🎤 I’m looking forward to seeing you all there! 🤩 #MalwareVillage #dc33
🔴 CVE-2025-53770 (CVSS 9.8): Critical SharePoint RCE actively exploited as part of #ToolShell 👀 9,762 hosts online (Censys): hubs.ly/Q03y6BW80 🔎@GreyNoiseIO flagged + Censys scans show RDP TCP/3389 using “alikullab1” untrusted cert #CVE202553770 #SharePoint