Bongoknight

OSINT, CTI, adict to graphs and python scripts. ISO 3103 compliant.

Love to learn, learning is the beginning towards becoming a better human.

Not an English native, hope I don't sound too harsh.

He/him - 30 - Cyber Threat Analyst

2025-12-07

@NemoJmeno
Pas de pression! Ça s'arrêterait là que personne serait déçu, on a déjà eu plein d'anecdotes insolites et de jolis dessins 😉

2025-12-07

@planina
I just love this rolodex use 😁

2025-12-07

@NemoJmeno
Vraiment cette série est trop chouette! 😃

Bongoknight boosted:
hrbrmstr 🇺🇦 🇬🇱 🇨🇦hrbrmstr
2025-12-05

I had the [mis?]fortune of being awake just as attackers decided to slam the public internet with React2Shell exploits. GreyNoise had a tag up for it yesterday afternoon.

Full write-up of the initial spate of attacks:
greynoise.io/blog/cve-2025-551
1/3

Bongoknight boosted:
2025-12-05

I just improved some features and fixed some bugs in Cyberclip.

- JSON data extraction
- Command palette search speed
- Hidden par default the text-related actions, as they clutter the UI. They are still accessible through the command palette (Ctrl+P).

Take a look at the images and alt text for more context. Feel free to reach out if you have any questions.

github.com/BongoKnight/cybercl

#threatintel #CTI #threathunting

Terminal User Interface displaying a JSON structure and allowing user to select field of interests that should be returned.Main Terminal User Interface, domain names are displayed in the middle. On the left, useful actions for investigating domain names are displayed.Terminal User Interface for rules creation. Here, a rule is created in three steps. It allows you to extract file hashes from text and return file signature information by querying the VirusTotal API and returning only the interesting JSON fields.Terminal User Interface showing a command palette. The defined recipe appears here and could be used in future investigations!
2025-12-03
2025-12-02

I just improved some features and fixed some bugs in Cyberclip.

- JSON data extraction
- Command palette search speed
- Hidden par default the text-related actions, as they clutter the UI. They are still accessible through the command palette (Ctrl+P).

Take a look at the images and alt text for more context. Feel free to reach out if you have any questions.

github.com/BongoKnight/cybercl

#threatintel #CTI #threathunting

Terminal User Interface displaying a JSON structure and allowing user to select field of interests that should be returned.Main Terminal User Interface, domain names are displayed in the middle. On the left, useful actions for investigating domain names are displayed.Terminal User Interface for rules creation. Here, a rule is created in three steps. It allows you to extract file hashes from text and return file signature information by querying the VirusTotal API and returning only the interesting JSON fields.Terminal User Interface showing a command palette. The defined recipe appears here and could be used in future investigations!
Bongoknight boosted:
2025-12-02

Support for PEP 723 (inline script metadata) has landed on pip's main branch thanks to some helpful guidance from the maintainers.

github.com/pypa/pip/commit/369

Here's hoping it'll smooth out some distribution wrinkles for people who have been getting along with just-pip and single-file scripts paired with requirements files 🤞

#Python

Bongoknight boosted:
2025-11-28

I'm offering a rare public, online session of my Applied #CTI #CyberThreatIntelligence training course in January for an evening North America/morning Australia/Asia timeframe, regiter your interest today!
forms.gle/i3n4srD6hWzfaX999

Bongoknight boosted:
2025-11-26

The Correct Incantation

#webcomic #krita #miniFantasyTheater

A comic in four panels:

Panel 1. The gothic sorceress, dressed in dark, flowing robes, stands in the middle of a desolated land. She gazes at the colorful mechanical parrot flying near her shoulder: the Avian Intelligent Parrot. The sorceress asks with a hint of curiosity.  
> Gothic sorceress: "Hey, Avian Intelligence, what's the incantation for summoning a fireball?"  
> AI Parrot: ":sparkle emoji: The correct incantation for a fireball is "IgnisMe"."  

Panel 2. The gothic sorceress cracks a wicked smile, her eyes shining with anticipation as she raises her hands in front of her, fingers spread and ready to cast.  
> Gothic sorceress: "Alright, let's give it a shot... IgnisMe!"

Panel 2(small insert in previous panel). Only the eyes of the gothic sorceress are visible in a large flame.
> Gothic sorceress: "?!!"

Panel 3. The gothic sorceress is burnt, her face contorted in a mix of shock, anger, and pain. Flames and smoke dance around her, her dark robes burnt and tattered, revealing exposed parts of her anatomy.  
> Gothic sorceress: "You #*$%@& bird! You gave me a self-immolation spell instead of a fireball spell!"  

Panel 4. As the sorceress facepalms, the Avian Intelligent parrot replies with stoicism.  
> AI Parrot: ":sparkle emoji: You're absolutely right! The correct incantation for a fireball is "PyroBolus"."
Bongoknight boosted:
2025-11-26

The new issue of CTI Zine is about UrlScan, a URL scanning service. However, UrlScan is also useful for discovering more infrastructure related to phishing or malware.

So here it is:
github.com/BongoKnight/CTI-Zin

You can also find a one-page A4 version that you can print and keep near your desk!

github.com/BongoKnight/CTI-Zin

Feedbacks are welcome!

#ThreatIntel #CTI #osint #urlscan

Bongoknight boosted:
2025-11-25

Over the last 12 months, watchTowr Labs uncovered thousands of leaked credentials: cloud keys, AD creds, API tokens, even KYC data - already being abused.

Join us on our journey into “innocent” developer tools.

labs.watchtowr.com/stop-puttin

2025-11-24

@erin
(More on resip ecosystem here : blog.sekoia.io/unveiling-the-d
Or about Badbox one of the biggest ones that come preinstalled on Andoid TV ans is used as residential proxy
ncsc.gov.ie/pdfs/AndroidBadbox
)

2025-11-24

@erin
For the botnet part, I'm pretty sure that the use of residential proxy for trainning have been documented. I struggle for now to find a good source.

But as an example, LumiProxy, which is a shaddy residential proxy that publish ads on cybercrime forum and that is backed by botnets, advertise that it can be used to scrap for LLM training.

lumiproxy.com/proxies/unlimite

Bongoknight boosted:
2025-11-24

[nouveau sur la forge]

"Dessin Texte", qui permet de dessiner dans le navigateur, mais au lieu de juste faire un trait, le dessin est composé par les lettres d'un texte.
Plus on va vite, plus la police grossit. De quoi aborder la découverte des lettres de façons artistique en maternelle, et même après.

Une ressource (parmi 5768 autres) de la forge des communs numériques éducatifs que l'on doit à l'ERUN Hervé Allesant @Professeurherve

professeurherve.forge.apps.edu

#LaForge #LaForgeEdu

Illustration de Dessin Texte avec un poème de Verlaine
2025-11-24

@Daniii
J'espère qu'il en restera quelque chose! Mais oui, tellement de gens sont subjugués et ne cherchent pas à verifier ce qui en sort.

Ça me terrifie d'autant plus que je bosse dans un secteur qui est ultra perméable aux LLM alors que dans mon taf on doit vérifier tout ce qu'on dit. Du coup, je lutte avec nos stagiaires.

On dirait que prendre son temps et rechercher la rigueur ça intéresse de moins en moins de monde!

2025-11-24

@Daniii
L'IA ce fléau... Courage!

2025-11-24

There are too many emojis, but you could think of it as a tribute to Screaminggoat. The investigation was made by a teammate and me (for IoC extraction)!

infosec.exchange/@worldwatch_o

Bongoknight boosted:
Lisi Hockelisihocke
2025-11-22

This week was super busy, but it started out really nice with attending together with a bunch of my colleagues. Fully enjoyed my time there, seeing folks from last editions and also again, learning together. Many thanks to the organizers for giving us this space! Finally, here are the I took during the conference day. Thread. 🧵

Bongoknight boosted:
2025-11-21

Here is an article produced by my colleague Marine Pichon. It explore and merge many aliases of known malware tied to the North Korean Operation DreamJob.

orangecyberdefense.com/global/

#threatintel #cti #operationdreamjob #UNC2970

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst