CtrlAltDefend ♀️'s Avatar

CtrlAltDefend ♀️

@zxqa.bsky.social

*Can’t decide my path—there’s just too much to protect.* Forever learning, always adapting. 💻✨ #CyberSecurity #ThreatHunter #InfoSec

33 Followers  |  185 Following  |  31 Posts  |  Joined: 26.01.2025  |  1.5613

Latest posts by zxqa.bsky.social on Bluesky


YouTube Share your videos with friends, family, and the world

youtube.com/clip/UgkxTSp...
When we’re quick to give advice, what happens?

07.05.2025 14:20 — 👍 0    🔁 0    💬 0    📌 0
xdscvr - Search Cyber Threats with AI. Search Threat News and get instant insights about the latest cybersecurity threats with xdscvr.

Made some enhancements to my website xdscvr.com

02.04.2025 16:00 — 👍 0    🔁 0    💬 0    📌 0
Post image

Someone forgot to filter for prompt injection...

27.03.2025 16:21 — 👍 131    🔁 18    💬 5    📌 0
xdscvr - Discover & Analyze Cyber Threats Explore and analyze the latest cybersecurity threats with xdscvr.

Hayo,
I built my webapp which searches in google then outputs the search results in addition to ai summary for each search result!! Isn’t that amazing 😍

my-threat-news.vercel.app

04.03.2025 21:26 — 👍 0    🔁 0    💬 0    📌 0

How do you exit vim?

18.02.2025 10:06 — 👍 0    🔁 0    💬 0    📌 0

Ever used forensics for threat detection?
If yes please explain.

15.02.2025 17:12 — 👍 1    🔁 0    💬 0    📌 0

Registry Settings for Code Persistence

HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Run: used to start automatically for all users during system startup.
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run: used to start automatically for the current user during login.

07.02.2025 21:19 — 👍 1    🔁 0    💬 0    📌 0

Important registry files:
%SYSTEMROOT%\system32\config
-- SYSTEM
-- SOFTWARE
-- SAM
-- SECURITY
user profile (e.g., c:\users\administrator)
-- NTUSER.DAT
-- USRCLASS.DAT
C:\Windows\appcompat\Programs\
-- AMCACHE.HVE

07.02.2025 21:14 — 👍 1    🔁 0    💬 0    📌 0

It seems like a remote job is a good idea *manifesting*

07.02.2025 00:24 — 👍 0    🔁 0    💬 0    📌 0
Post image 06.02.2025 21:03 — 👍 0    🔁 0    💬 0    📌 0

Or how many incidents have occurred when in fact there were no detection rules activated to detect any !

04.02.2025 09:14 — 👍 0    🔁 0    💬 0    📌 0

number of vulnerabilities patched when in fact the scanner wasn’t functioning.. Properly so the number is not accurate 🫢 and list goes on of issues

04.02.2025 09:13 — 👍 0    🔁 0    💬 1    📌 0

I do consider myself highly qualified for the job of cybersecurity operations manager but i always get hit by audits because the way I look to it is that i see operational issues and I fix them but to the audits they want lets say

04.02.2025 09:13 — 👍 0    🔁 0    💬 1    📌 0

Totally agree

04.02.2025 09:07 — 👍 1    🔁 0    💬 1    📌 0

And just when we think we’re ahead,

Suddenly, all our efforts feel like they’re unseen, and we’re back to square one.

04.02.2025 08:48 — 👍 0    🔁 0    💬 1    📌 0

Every time I feel like I’m making progress whether by implementing a new solution or improving a process I get hit by regulatory checks that expose fundamental gaps.

04.02.2025 08:48 — 👍 0    🔁 0    💬 1    📌 0
Post image

People who work in cyber security of a highly regulated companies.. how do you manage the pressure of compliance and especially when IT fails to provide the necessary support or even follow basic cybersecurity guidelines?

04.02.2025 08:48 — 👍 0    🔁 0    💬 1    📌 0

You’re welcome

30.01.2025 22:44 — 👍 0    🔁 0    💬 0    📌 0
Post image

i am on a mission to complete all defensive security badges in Cybrary because why NOT!

29.01.2025 16:29 — 👍 1    🔁 0    💬 0    📌 0
Post image 29.01.2025 15:42 — 👍 1    🔁 0    💬 0    📌 0

Yeah I did install it on my pc its easy to setup 👍🏼

29.01.2025 15:39 — 👍 0    🔁 0    💬 0    📌 0
Preview
Jan: Open source ChatGPT-alternative that runs 100% offline - Jan Chat with AI without privacy concerns. Jan is an open-source alternative to ChatGPT, running AI models locally on your device.

I stumbled upon this open-source ChatGPT alternative that runs 100% offline!

jan.ai

27.01.2025 16:41 — 👍 1    🔁 0    💬 0    📌 0

Deepseek has been my daily driver for a while and what most don't know is that it is suspiciously good at writing offsec tools...

26.01.2025 09:45 — 👍 4    🔁 4    💬 1    📌 0
LOLBAS

LOLBins/Drivers Key resources:
→ LOLBAS: [lolbas-project.github.io](lolbas-project.github.io)
→ LOLDrivers: [loldrivers.io](www.loldrivers.io)
Detect abused tools & malicious drivers.
#LOLBins #LOLDrivers

26.01.2025 02:24 — 👍 1    🔁 0    💬 0    📌 0
Preview
The DFIR Report Real Intrusions by Real Attackers, The Truth Behind the Intrusion

11. CDK
- Escapes Docker via `mount-cgroup` and deploys crypto miners.

12. LockBit 3.0 Builder
- Custom `LB3.exe` drops ransom notes linking to `t.me/You_Dun`.

13. Telegram & Redis
- Telegram channel `You_Dun` for victim shaming.

→ [The DFIR Report](thedfirreport.com)

26.01.2025 01:48 — 👍 0    🔁 0    💬 0    📌 0
https://f8x.io/viper #!/usr/bin/env bash #set -x # ======================== !! NOTE !! ======================== # ________ ________ ________ ________ ________ ________ ________ ________ ________ ___ ___ # |\ ___...

9. Viper C2
- Installation: Deployed via `curl -sL f8x.io/viper | bash`.

Privilege Escalation
10. Traitor
- Exploits Linux vulns (e.g., CVE-2021-4034) for root access.

26.01.2025 01:48 — 👍 0    🔁 0    💬 1    📌 0

🚨 the "You Dun" Threat Group

Command & Control (C2)
8. Cobalt Strike
- Plugins:
- TaoWu: Drops `SharpHound.exe` for AD recon and `JuicyPotato.dll` for privilege escalation.
- Ladon: Automates payload execution across Windows domains.

26.01.2025 01:48 — 👍 1    🔁 1    💬 1    📌 0
Preview
The DFIR Report Real Intrusions by Real Attackers, The Truth Behind the Intrusion

🛑 the "You Dun" Threat Group
exploitation toolkit:

5. SQLmap
- Automated SQLi tool used to dump databases
6. Seeyon_exp
- Custom exploit
7. Weaver_exp
- Zhiyuan OA weaponizer leveraging deserialization flaws.

[The DFIR Report](thedfirreport.com)

26.01.2025 01:39 — 👍 0    🔁 0    💬 0    📌 0

4. Dirsearch
- Directory brute-forcer to map exposed endpoints.
- TTP: Targets `/wp-admin`, `/backup`, and other sensitive paths.
- Detect: Block IPs with repetitive `404`/`403` errors in short timeframes.

26.01.2025 01:28 — 👍 0    🔁 0    💬 0    📌 0

3. Xray
- mass vulnerability scanner probing Chinese websites for misconfigurations.
- TTP: Focuses on CMS platforms and IoT devices.
- Detect: Watch for aggressive scanning patterns (e.g., 10+ unique paths/sec).

26.01.2025 01:28 — 👍 0    🔁 0    💬 1    📌 0

@zxqa is following 20 prominent accounts