0xhackerr's profile picture.

0xHacker

@0xhackerr

0xHacker gönderiyi yeniden yayınladı

Google Dork - Code Leaks 🔑 site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Check for code snippets, secrets, configs 👀

TakSec's tweet image. Google Dork - Code Leaks 🔑

site:pastebin. com "example. com"
site:jsfiddle. net "example. com"
site:codebeautify. org "example. com"
site:codepen. io "example. com"

Check for code snippets, secrets, configs 👀

0xHacker gönderiyi yeniden yayınladı

You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡 1) Create a clone into a new template of the target VM 2) Download the VMDK file of the template from the storage 3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY (1/3)

ShitSecure's tweet image. You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡

1) Create a clone into a new template of the target VM
2) Download the VMDK file of the template from the storage
3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY 
(1/3)

0xHacker gönderiyi yeniden yayınladı

Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳

Defte_'s tweet image. Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳

0xHacker gönderiyi yeniden yayınladı

Google Dork - XSS Prone Parameters 🔥 site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& Test for XSS in param value: '"><img src=x onerror=alert()> Credit: @TakSec #infosec #bugbounty #bugbountytips

viehgroup's tweet image. Google Dork - XSS Prone Parameters 🔥
site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:&amp;amp;

Test for XSS in param value:
&apos;&quot;&amp;gt;&amp;lt;img src=x onerror=alert()&amp;gt;

Credit: @TakSec 

#infosec #bugbounty #bugbountytips

0xHacker gönderiyi yeniden yayınladı

Google Dork - APIs Endpoints ⚙️ site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3 Find hidden APIs, try techniques 👨‍💻

TakSec's tweet image. Google Dork - APIs Endpoints ⚙️
site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3

Find hidden APIs, try techniques 👨‍💻

0xHacker gönderiyi yeniden yayınladı

real-time cloning of any voice from a few seconds of audio

tom_doerr's tweet image. real-time cloning of any voice from a few seconds of audio

0xHacker gönderiyi yeniden yayınladı

A very little-known SEO wins:

hridoyreh's tweet image. A very little-known SEO wins:

0xHacker gönderiyi yeniden yayınladı

WOW!!! temp43487580.github.io/intune/bypass-… @TEMP43487580 such a good post!!! it is so well written, interesting research and great results! Thank you! 🤩


0xHacker gönderiyi yeniden yayınladı

#malware "clipup.exe" in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file github: /2x7EQ13/CreateProcessAsPPL #redteam #BlueTeam

TwoSevenOneT's tweet image. #malware
&quot;clipup.exe&quot; in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam #BlueTeam
TwoSevenOneT's tweet image. #malware
&quot;clipup.exe&quot; in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam #BlueTeam
TwoSevenOneT's tweet image. #malware
&quot;clipup.exe&quot; in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam #BlueTeam

0xHacker gönderiyi yeniden yayınladı

How process hollowing works #ThreatHunting #DFIR


0xHacker gönderiyi yeniden yayınladı

"Localhost tracking" - How Meta bypassed Android sandboxing to track users browsing other websites with Meta's embedded pixel. Fun fact: 22% of the most visited websites across the world embed Meta's pixel. zeropartydata.es/p/localhost-tr…

payloadartist's tweet image. &quot;Localhost tracking&quot; - How Meta bypassed Android sandboxing to track users browsing other websites with Meta&apos;s embedded pixel.

Fun fact: 22% of the most visited websites across the world embed Meta&apos;s pixel. 

zeropartydata.es/p/localhost-tr…

0xHacker gönderiyi yeniden yayınladı

Search Engine for pen-testers and bug Hunters

_0b1d1's tweet image. Search Engine for pen-testers and bug Hunters

0xHacker gönderiyi yeniden yayınladı

#malware If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔 #redteam #code

TwoSevenOneT's tweet image. #malware
If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔
#redteam #code
TwoSevenOneT's tweet image. #malware
If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔
#redteam #code
TwoSevenOneT's tweet image. #malware
If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔
#redteam #code

0xHacker gönderiyi yeniden yayınladı

Attackers exploit Google Translate to hide their assets from security vendors. securelist.com/new-phishing-a…

blackorbird's tweet image. Attackers exploit Google Translate to hide their assets from security vendors.
securelist.com/new-phishing-a…

0xHacker gönderiyi yeniden yayınladı

#redteam Hey, look! Windows with two "System32" folders.😲 Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲 #malware #blueteam

TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two &quot;System32&quot; folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam
TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two &quot;System32&quot; folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam
TwoSevenOneT's tweet image. #redteam
Hey, look! Windows with two &quot;System32&quot; folders.😲
Hey, keep looking at this! A process loads the same DLL twice and keeps both instances in memory.😲
#malware #blueteam

0xHacker gönderiyi yeniden yayınladı

0xHacker gönderiyi yeniden yayınladı

Ohhhh, sneaky masquerading trick found in the wild and noted by @JAMESWT_WT The Threat Actor replaces / with "ん", a Japanese character +2 cat pictures

vxunderground's tweet image. Ohhhh, sneaky masquerading trick found in the wild and noted by @JAMESWT_WT

The Threat Actor replaces / with &quot;ん&quot;, a Japanese character

+2 cat pictures

0xHacker gönderiyi yeniden yayınladı

Windows Fonts Exploitation in 2025 - Bypassing UAC with Eudcedit Check out my recent research about eudcedit and see how it can by used to bypass UAC. medium.com/@matanb707/win… #UserAccountControl #UAC #Bypass #Windows


0xHacker gönderiyi yeniden yayınladı

⚠️⚠️ CVE-2025-54982(CVSS 9.6)Zscaler's server-side SAML authentication mechanism allowed authentication abuse due to improper cryptographic signature verification. 🎯3.6M+Results are found on the en.fofa.info nearly year 🔗FOFA Link:en.fofa.info/result?qbase64… FOFA…

fofabot's tweet image. ⚠️⚠️ CVE-2025-54982(CVSS 9.6)Zscaler&apos;s server-side SAML authentication mechanism allowed authentication abuse due to improper cryptographic signature verification.
🎯3.6M+Results are found on the en.fofa.info nearly year
🔗FOFA Link:en.fofa.info/result?qbase64…
FOFA…

United States Trendler

Loading...

Something went wrong.


Something went wrong.