DarkCoder75's profile picture. {
Malware Addict
}
C# Dev, Linux, SysAdmin CyberSecu

https://cloudguardpro.com

DarkCoder

@DarkCoder75

{ Malware Addict } C# Dev, Linux, SysAdmin CyberSecu https://cloudguardpro.com

DarkCoder أعاد

🕵️100 Useful Forensic Tools 🔖#cybersecurity #hacking #pentesting #security

_0b1d1's tweet image. 🕵️100 Useful Forensic Tools

🔖#cybersecurity #hacking #pentesting #security

DarkCoder أعاد

Hacker Search Engines

SecurityTrybe's tweet image. Hacker Search Engines

DarkCoder أعاد

These Linux commands helped me most in last 13 years of IT career Daily stuff: • ps aux | grep {process} - Find that sneaky process • lsof -i :{port} - Who's hogging that port? • df -h - The classic "we're out of space" checker • netstat -tulpn - Network connection detective…


DarkCoder أعاد

⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders Read more: cybersecuritynews.com/defenderwrite-… A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

The_Cyber_News's tweet image. ⚠️ DefenderWrite Tool Let Attackers Inject Malicious DLLs into AV Executable Folders 

Read more: cybersecuritynews.com/defenderwrite-…

A new tool called DefenderWrite exploits whitelisted Windows programs to bypass protections and write arbitrary files into antivirus executable folders,…

DarkCoder أعاد

Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques class.malware.re

5mukx's tweet image. Free Malware Analysis Course, covers malware concepts, malware analysis, and black-box reverse engineering techniques

class.malware.re

DarkCoder أعاد

Just a simple silly PoC demonstrating executable "exe" file that can be used like exe, dll or shellcode... github.com/Dump-GUY/EXE-o…


DarkCoder أعاد

🛠️ Bettercap — Network Recon & MITM Framework Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. #Bettercap #NetworkSecurity #MITMDetection

Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection
Anastasis_King's tweet image. 🛠️ Bettercap — Network Recon & MITM Framework

Powerful toolkit for network monitoring, protocol inspection, and authorized MITM-style testing — ideal for defenders to validate detections and for learning how attackers operate. 

#Bettercap #NetworkSecurity #MITMDetection

DarkCoder أعاد

A new Zero-Click NTLM leak bypasses Microsoft's LNK patch, allowing unauthenticated NTLM hash theft on patched systems. The PoC works by exploiting UNC paths and the default shell32.dll icon reference. #NTLMleak #ZeroClick #LNKattack #Cybersecurity securityonline.info/zero-click-ntl…


DarkCoder أعاد

You can use Subfinder to find subdomains from specific data sources for more targeted reconnaissance.  For example: subfinder -d tesla. com -s virustotal to query only VirusTotal's dataset. Want to learn more tricks?  Check out our complete guide to learn everything about…

pdiscoveryio's tweet image. You can use Subfinder to find subdomains from specific data sources for more targeted reconnaissance. 

For example: subfinder -d tesla. com -s virustotal to query only VirusTotal's dataset.

Want to learn more tricks? 

Check out our complete guide to learn everything about…

DarkCoder أعاد

The Chinese Hack of the US Telecom System is due to the SS7 Vulnerability. I'm surprised it took this long to do it!

New from 404 Media: DHS knows which countries are primarily abusing SS7 vulns in U.S. telecom networks, allowing location tracking, text/call intercept. China, Russia, Iran, Israel mostly. DoD also says *all* U.S. telecoms vulnerable to such attacks 404media.co/dhs-says-china…



DarkCoder أعاد

🛡️ Bypassing DEP - Exploit Dev 4 🔧 Use Windows API and ROP chains 🚫 DEP blocks stack-based code exec 🔍 Use VirtualAlloc to enable execution 👉youtube.com/watch?v=phVz8C…

GuidedHacking's tweet image. 🛡️ Bypassing DEP - Exploit Dev 4
🔧 Use Windows API and ROP chains
🚫 DEP blocks stack-based code exec
🔍 Use VirtualAlloc to enable execution
👉youtube.com/watch?v=phVz8C…

DarkCoder أعاد

CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw. Check: github.com/mverschu/CVE-2…

7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…
7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…
7h3h4ckv157's tweet image. CVE-2025-33073: PoC Exploit for the NTLM reflection SMB flaw.

Check: github.com/mverschu/CVE-2…

DarkCoder أعاد

ShellExec using msgbox.exe => in my C2 Facility. Bypassing EDR's. a cool new way = ) Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

5mukx's tweet image. ShellExec using msgbox.exe => in my C2 Facility.  Bypassing EDR's. a cool new way = ) 

Actually tg is just an sample, you can use calendar, teams or whatever that can communicate with apis. to uplaod & exec your custom agents !

DarkCoder أعاد

Want to boost your #OSINT investigations? 🔍 Check out @intelligencesecurityiobot on Telegram! It quickly searches domains, URLs, and more, making data gathering easier. Perfect for researchers, analysts, and security enthusiasts! 🚀 #CyberSecurity #Intelligence

akaclandestine's tweet image. Want to boost your #OSINT investigations? 🔍  
Check out @intelligencesecurityiobot on Telegram!  
It quickly searches domains, URLs, and more, making data gathering easier.  
Perfect for researchers, analysts, and security enthusiasts! 🚀

#CyberSecurity #Intelligence…
akaclandestine's tweet image. Want to boost your #OSINT investigations? 🔍  
Check out @intelligencesecurityiobot on Telegram!  
It quickly searches domains, URLs, and more, making data gathering easier.  
Perfect for researchers, analysts, and security enthusiasts! 🚀

#CyberSecurity #Intelligence…

DarkCoder أعاد

🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook". ZoomEye Dork👉banner="Samba" Over 265.8k vulnerable instances. ZoomEye Link:…

zoomeye_team's tweet image. 🚨🚨CVE-2025-10230 (CVSS 10): Critical Samba RCE Flaw
Unauthenticated RCE in Samba AD DCs: improper input sanitization in the WINS server lets attackers inject commands via "wins hook".

ZoomEye Dork👉banner="Samba"
Over 265.8k vulnerable instances.
ZoomEye Link:…

DarkCoder أعاد

🔍 Bug Bounty Tip: WAF Bypass Evade WAF’s URL normalization with double encoding (%252f) or unusual paths. Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets-- Test only on authorized systems! 🛡️

HackingTeam777's tweet image. 🔍 Bug Bounty Tip: WAF Bypass
Evade WAF’s URL normalization with double encoding (%252f) or unusual paths.

Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets--

Test only on authorized systems! 🛡️

DarkCoder أعاد

🐳 DOCKER COMMANDS CHEAT SHEET

NanouuSymeon's tweet image. 🐳 DOCKER COMMANDS CHEAT SHEET

DarkCoder أعاد

Master x86-64 Assembly by Building a GUI from Scratch: The Ultimate Hands-On Learning Experience!

Aadriksh's tweet image. Master x86-64 Assembly by Building a GUI from Scratch: The Ultimate Hands-On Learning Experience!

United States الاتجاهات

Loading...

Something went wrong.


Something went wrong.