Crypt2Shell's profile picture. ']['ARGET: #ISIS

/\//\\//\

@Crypt2Shell

']['ARGET: #ISIS

/\//\\//\ reposted

#Client_Hacking 1-Darkcomet 2-FatRat 3-Veil-Evasion 4-Shallter 5-Unicorn 6-Setoolkit 7-Armitage 8-BeEF-Framework 9-EmPyre 10-FakeImageExploiter 11-Pupy 12-DFU-Programmer 13-Cobalt Strike 14-Exploitpack 15-Gcat 16-Crowbar


/\//\\//\ reposted

Simple but effective method to narrow down your scope, sometimes it helps to think simple. waybackurls --dates domain(.)com | grep '?id=' Payload : if(now()=sysdate(),SLEEP(8),0) By:@ynsmroztas #bugbountytips #bugbounty

RootMoksha's tweet image. Simple but effective method to narrow down your scope, sometimes it helps to think simple.

waybackurls --dates domain(.)com | grep '?id='

Payload : if(now()=sysdate(),SLEEP(8),0)

By:@ynsmroztas 

#bugbountytips #bugbounty

/\//\\//\ reposted

This is Flipper ZERO. It can hack your house and get into it. Here are 07 wild hacks it can do.

KI_HAL_2023's tweet image. This is Flipper ZERO.

It can hack your house and get into it.

Here are 07 wild hacks it can do.

/\//\\//\ reposted

WPScan - Best Flags 🔥 wpscan --url https://example[.]com --api-token <api token> --plugins-detection mixed -e vp,vt,cb,dbe,u1-10 --force A thread 🧵👇

TakSec's tweet image. WPScan - Best Flags 🔥

wpscan --url https://example[.]com --api-token &amp;lt;api token&amp;gt; --plugins-detection mixed -e vp,vt,cb,dbe,u1-10 --force

A thread 🧵👇

/\//\\//\ reposted

Want to gather information about an email? Zehef checks email reputation, possible accounts and more. github.com/N0rz3/Zehef #OSINT #reconnaissance #DFIR #ThreatIntel #CTI #cli #BlueTeam #infosec #investigation #intelligence

DailyOsint's tweet image. Want to gather information about an email?

Zehef checks email reputation, possible accounts and more. 

github.com/N0rz3/Zehef

#OSINT #reconnaissance #DFIR #ThreatIntel #CTI #cli #BlueTeam #infosec #investigation #intelligence

/\//\\//\ reposted

Great blog post for learning Linux (Android) kernel exploitation (Analysis and exploitation of CVE-2017-11176) Credits @Firzen14 (@bluefrostsec) labs.bluefrostsecurity.de/revisiting-cve… #Linux #kernel #exploit #infosec #cybersecurity

0xor0ne's tweet image. Great blog post for learning Linux (Android) kernel exploitation
(Analysis and exploitation of CVE-2017-11176)
Credits @Firzen14 (@bluefrostsec)

labs.bluefrostsecurity.de/revisiting-cve…

#Linux #kernel #exploit #infosec #cybersecurity
0xor0ne's tweet image. Great blog post for learning Linux (Android) kernel exploitation
(Analysis and exploitation of CVE-2017-11176)
Credits @Firzen14 (@bluefrostsec)

labs.bluefrostsecurity.de/revisiting-cve…

#Linux #kernel #exploit #infosec #cybersecurity
0xor0ne's tweet image. Great blog post for learning Linux (Android) kernel exploitation
(Analysis and exploitation of CVE-2017-11176)
Credits @Firzen14 (@bluefrostsec)

labs.bluefrostsecurity.de/revisiting-cve…

#Linux #kernel #exploit #infosec #cybersecurity
0xor0ne's tweet image. Great blog post for learning Linux (Android) kernel exploitation
(Analysis and exploitation of CVE-2017-11176)
Credits @Firzen14 (@bluefrostsec)

labs.bluefrostsecurity.de/revisiting-cve…

#Linux #kernel #exploit #infosec #cybersecurity

/\//\\//\ reposted

Nice reading on how to modify meterpreter for bypassing EDRs Credits @VirtualAllocEx redops.at/en/blog/meterp… #redteam #infosec #cybersecurity #offsec

0xor0ne's tweet image. Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx

redops.at/en/blog/meterp…

#redteam #infosec #cybersecurity #offsec
0xor0ne's tweet image. Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx

redops.at/en/blog/meterp…

#redteam #infosec #cybersecurity #offsec
0xor0ne's tweet image. Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx

redops.at/en/blog/meterp…

#redteam #infosec #cybersecurity #offsec
0xor0ne's tweet image. Nice reading on how to modify meterpreter for bypassing EDRs
Credits @VirtualAllocEx

redops.at/en/blog/meterp…

#redteam #infosec #cybersecurity #offsec

/\//\\//\ reposted

Chaining DLL Hijacking and Format String to gain RCE on windows RDP Client CVE-2023-24905 cyolo.io/blog/dll-hijac…


/\//\\//\ reposted

Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…

_xpn_'s tweet image. Quick POC this evening looking at how LAPS (v2) passwords are stored and decrypted on Active Directory (tl;dr, msLAPS-EncryptedPassword attr and NCryptStreamUpdate for crypto) gist.github.com/xpn/23dc5b6c26…

/\//\\//\ reposted

7 years and still a great read. How Phineas Fisher took down HackingTeam. gist.github.com/jaredsburrows/… #antisec #talent

hackerschoice's tweet image. 7 years and still a great read. How Phineas Fisher took down HackingTeam. gist.github.com/jaredsburrows/… #antisec #talent

/\//\\//\ reposted

Persistent PHP payloads in PNGs: How to inject PHP code in an image – synacktiv.com/publications/p…


/\//\\//\ reposted

Tips to find your Public IP from command line.

qusaialhaddad's tweet image. Tips to find your Public IP from command line.

/\//\\//\ reposted

New attack campaign utilized a new 0-day RCE vulnerability on Microsoft Exchange Server gteltsc.vn/blog/warning-n…


/\//\\//\ reposted

Ever wondered how a QR code works? No, me neither but it's low-key fascinating. (Warning, there is some extremely nerdy shit here.👇 )

DanHollick's tweet image. Ever wondered how a QR code works?  
No, me neither but it&apos;s low-key fascinating.

(Warning, there is some extremely nerdy shit here.👇 )

/\//\\//\ reposted

New blog post! Part 1 in my new PlayStation hacking series: An **unpatched** PS4 / PS5 userland exploit that also allows pirating PS2 games. mast1c0re: Hacking the PS4 / PS5 through the PS2 emulator - Part 1 - Escape: cturt.github.io/mast1c0re.html Video demo: youtube.com/watch?v=GIl1mR…

CTurtE's tweet card. mast1c0re PS2 Emulator Escape Demo - Backup Loader Scenario

youtube.com

YouTube

mast1c0re PS2 Emulator Escape Demo - Backup Loader Scenario


/\//\\//\ reposted

"Malware development tricks. Download and inject logic. C++ example." #infosec #pentest #redteam cocomelonc.github.io/tutorial/2022/…

CyberWarship's tweet image. &quot;Malware development tricks. Download and inject logic. C++ example.&quot;

#infosec #pentest #redteam
cocomelonc.github.io/tutorial/2022/…
CyberWarship's tweet image. &quot;Malware development tricks. Download and inject logic. C++ example.&quot;

#infosec #pentest #redteam
cocomelonc.github.io/tutorial/2022/…

/\//\\//\ reposted

This new trick for turning any PHP LFI to RCE is awesome! I've been wondering why it didn't get more attention since it works better than any other LFI2RCE techniques out there (such as expect://).Props to @loknop for publishing this technique initially👏 book.hacktricks.xyz/pentesting-web…

c3l3si4n's tweet image. This new trick for turning any PHP LFI to RCE is awesome! I&apos;ve been wondering why it didn&apos;t get more attention since it works better than any other LFI2RCE techniques out there (such as expect://).Props to @loknop for publishing this technique initially👏 
book.hacktricks.xyz/pentesting-web…

Loading...

Something went wrong.


Something went wrong.