DarkCoder75's profile picture. {
Malware Addict
}
C# Dev, Linux, SysAdmin CyberSecu

https://cloudguardpro.com

DarkCoder

@DarkCoder75

{ Malware Addict } C# Dev, Linux, SysAdmin CyberSecu https://cloudguardpro.com

DarkCoder gönderiyi yeniden yayınladı

🕵️100 Useful Forensic Tools 🔖#cybersecurity #hacking #pentesting #security

_0b1d1's tweet image. 🕵️100 Useful Forensic Tools

🔖#cybersecurity #hacking #pentesting #security

DarkCoder gönderiyi yeniden yayınladı

Hacker Search Engines

SecurityTrybe's tweet image. Hacker Search Engines

DarkCoder gönderiyi yeniden yayınladı

These Linux commands helped me most in last 13 years of IT career Daily stuff: • ps aux | grep {process} - Find that sneaky process • lsof -i :{port} - Who's hogging that port? • df -h - The classic "we're out of space" checker • netstat -tulpn - Network connection detective…


DarkCoder gönderiyi yeniden yayınladı

⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders Read more: cybersecuritynews.com/defenderwrite-… A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

The_Cyber_News's tweet image. ⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders 

Read more: cybersecuritynews.com/defenderwrite-…

A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

DarkCoder gönderiyi yeniden yayınladı

Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques class.malware.re

5mukx's tweet image. Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques

class.malware.re

DarkCoder gönderiyi yeniden yayınladı

Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode... github.com/Dump-GUY/EXE-o…


DarkCoder gönderiyi yeniden yayınladı

🛠️ Bettercap — Network Recon & MITM Framework Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. #Bettercap #NetworkSecurity #MITMDetection

Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection

DarkCoder gönderiyi yeniden yayınladı

A new Zero-Click NTLM leak bypasses Microsoft's LNK patch, allowing unauthenticated NTLM hash theft on patched systems. The PoC works by exploiting UNC paths and the default shell32.dll icon reference. #NTLMleak #ZeroClick #LNKattack #Cybersecurity securityonline.info/zero-click-ntl…


DarkCoder gönderiyi yeniden yayınladı

GitHub - xaitax/NTSleuth: Comprehensive Windows Syscall Extraction & Analysis Framework github.com/xaitax/NTSleuth


DarkCoder gönderiyi yeniden yayınladı

You can use Subfinder to find subdomains from specific data sources for more targeted reconnaissance.  For example: subfinder -d tesla. com -s virustotal to query only VirusTotal's dataset. Want to learn more tricks?  Check out our complete guide to learn everything about…

pdiscoveryio's tweet image. You can use Subfinder to find subdomains from specific data sources for more targeted reconnaissance. 

For example: subfinder -d tesla. com -s virustotal to query only VirusTotal's dataset.

Want to learn more tricks? 

Check out our complete guide to learn everything about…

DarkCoder gönderiyi yeniden yayınladı

The Chinese Hack of the US Telecom System is due to the SS7 Vulnerability. I'm surprised it took this long to do it!

New from 404 Media: DHS knows which countries are primarily abusing SS7 vulns in U.S. telecom networks, allowing location tracking, text/call intercept. China, Russia, Iran, Israel mostly. DoD also says *all* U.S. telecoms vulnerable to such attacks 404media.co/dhs-says-china…



DarkCoder gönderiyi yeniden yayınladı

🛡️ Bypassing DEP - Exploit Dev 4 🔧 Use Windows API and ROP chains 🚫 DEP blocks stack-based code exec 🔍 Use VirtualAlloc to enable execution 👉youtube.com/watch?v=phVz8C…

GuidedHacking's tweet image. 🛡️ Bypassing DEP - Exploit Dev 4
🔧 Use Windows API and ROP chains
🚫 DEP blocks stack-based code exec
🔍 Use VirtualAlloc to enable execution
👉youtube.com/watch?v=phVz8C…

DarkCoder gönderiyi yeniden yayınladı

CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw. Check: github.com/mverschu/CVE-2…

7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…
7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…
7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…

DarkCoder gönderiyi yeniden yayınladı

GitHub - pacbypass/CVE-2025-11001: Exploit for CVE-2025-11001 or CVE-2025-11002 github.com/pacbypass/CVE-…


DarkCoder gönderiyi yeniden yayınladı

ShellExec using msgbox.exe => in my C2 Facility. Bypassing EDR's. a cool new way = ) Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

5mukx's tweet image. ShellExec using msgbox.exe => in my C2 Facility.  Bypassing EDR's. a cool new way = ) 

Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

DarkCoder gönderiyi yeniden yayınladı

Want to boost your #OSINT investigations? 🔍 Check out @intelligencesecurityiobot on Telegram! It quickly searches domains, URLs, and more, making data gathering easier. Perfect for researchers, analysts, and security enthusiasts! 🚀 #CyberSecurity #Intelligence

akaclandestine's tweet image. Want to boost your #OSINT investigations? 🔍  
Check out @intelligencesecurityiobot on Telegram!  
It quickly searches domains, URLs, and more, making data gathering easier.  
Perfect for researchers, analysts, and security enthusiasts! 🚀

#CyberSecurity #Intelligence…
akaclandestine's tweet image. Want to boost your #OSINT investigations? 🔍  
Check out @intelligencesecurityiobot on Telegram!  
It quickly searches domains, URLs, and more, making data gathering easier.  
Perfect for researchers, analysts, and security enthusiasts! 🚀

#CyberSecurity #Intelligence…

DarkCoder gönderiyi yeniden yayınladı

🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link:…

zoomeye_team's tweet image. 🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw
Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook".

ZoomEye Dork👉banner="Samba"
Over 265.8k vulnerable instances.
ZoomEye Link:…

DarkCoder gönderiyi yeniden yayınladı

🔍 Bug Bounty Tip: WAF Bypass Evade WAF’s URL normalization with double encoding (%252f) or unusual paths. Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets-- Test only on authorized systems! 🛡️

HackingTeam777's tweet image. 🔍 Bug Bounty Tip: WAF Bypass
Evade WAF’s URL normalization with double encoding (%252f) or unusual paths.

Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets--

Test only on authorized systems! 🛡️

DarkCoder gönderiyi yeniden yayınladı

🐳 DOCKER COMMANDS CHEAT SHEET

NanouuSymeon's tweet image. 🐳 DOCKER COMMANDS CHEAT SHEET

DarkCoder gönderiyi yeniden yayınladı

Master x86-64 Assembly by Building a GUI from Scratch: The Ultimate Hands-On Learning Experience!

Aadriksh's tweet image. Master x86-64 Assembly by Building a GUI from Scratch: The Ultimate Hands-On Learning Experience!

United States Trendler

Loading...

Something went wrong.


Something went wrong.