Grant Willcox

106 Followers
69 Following
220 Posts
Metasploit maintainer and exploit developer. Currently learning more about Ruby and programming.
GitHub (Work)https://github.com/gwillcox-r7
GitHub (Personal)https://github.com/tekwizz123
Blog (Old)https://tekwizz123.github.io
Bloghttps://tekwizz123.hashnode.dev/
Got off my call with Reddit just now about the API. Bad news unless I come up with 20 million dollars (not joking). Appreciate boosts. https://www.reddit.com/r/apolloapp/comments/13ws4w3/had_a_call_with_reddit_to_discuss_pricing_bad/
📣 Had a call with Reddit to discuss pricing. Bad news for third-party apps, their announced pricing is close to Twitter's pricing, and Apollo would have to pay Reddit $20 million per year to keep running as-is.

Hey all, I'll cut to the chase: 50 million requests costs $12,000, a figure far more than I ever could have imagined. Apollo made 7 billion...

reddit
Going to be at #bsidesaustin today so if anyone wants to meet up, feel free to ping, would love to meet y’all 🙂
You really have to be impressed with the pettiness of Microsoft, especially as Firefox use the same technique to set a default browser and they're not blocked :) https://gizmodo.com/microsoft-windows-google-chrome-feature-broken-edge-1850392901
Microsoft Broke a Chrome Feature to Promote Its Edge Browser

Windows borked a feature that let you change your default browser, and some users saw popups every time they opened Chrome. It's the 1990s again for Microsoft.

Gizmodo

Coming to @bsidesaustin this week? Come hang with the Recon team! 😎

#BSidesAustin

Parking passes for #BSidesAustin attendees: Watch for an Eventbrite email this week w/ final details, including the pass. OR visit https://bsidesaustin.com/location/ to download it. Print & display it on your dashboard (UT Security tickets!).

@SecurityBSidesGlobal

BSides Austin: Location

This week's wrap up brings a new Joomla scanner module for checking API access along with multiple bug fixes https://www.rapid7.com/blog/post/2023/04/28/metasploit-weekly-wrap-up-8/
Metasploit Weekly Wrap-Up | Rapid7 Blog

Rapid7

So apparently now you can't even search Twitter anymore with logging in. I should of expected that but as someone who likes to see what CVEs and other vulnerability info is being shared on Twitter without creating an account, this seems like an effort to make Twitter more of a walled environment than it already is.

Then again, that seems to be the direction most corps are going atm, so perhaps I shouldn't be all that shocked :/

And RubyMine is back to crashing at 100 percent CPU usage when debugging or running programs…..just great 🙃

We’ve taken pretty much all the Active Directory tradecraft from the years and distilled it into this course. The hard part has been finding the Goldilocks zone for intermediate hackers - not too entry level, not too AD 1%, but just right. It’s being given at @x33fcon to a small class. We’d love to see you there. https://www.x33fcon.com/#!t/adexploit.md

#training #hacking #x33fcon #sensepost #activedirectory

x33fcon

This weeks wrap up brings us three new exploit modules including an LPE and RCE for VMware Workspace ONE https://www.rapid7.com/blog/post/2023/04/21/metasploit-weekly-wrap-up-7/
Metasploit Weekly Wrap-Up | Rapid7 Blog

Rapid7