Engacker's profile picture. Try harder....

Engacker𓅓

@Engacker

Try harder....

اي حد يشوفه يقولي يخوانا نفسي في ال10مليون دولار

We remain committed to bringing leading AQS figures in HTS to justice. #Syria

USEmbassySyria's tweet image. We remain committed to bringing leading AQS figures in HTS to justice. #Syria


Engacker𓅓 a reposté

بسم الله الرحمن الرحيم الحمد لله رب العالمين، القائل: “وَلَا تَحْسَبَنَّ الَّذِينَ قُتِلُوا فِي سَبِيلِ اللَّهِ أَمْوَاتًا، بَلْ أَحْيَاءٌ عِندَ رَبِّهِمْ يُرْزَقُونَ.” أنا صالح. أترك وصيتي هذه، لا وداعًا، بل استمرارًا لطريقٍ اخترته عن يقين. يعلم الله أنني بذلت كل ما أملك من…


Engacker𓅓 a reposté

this was a googlectf challenge btw

rebane2001's tweet image. this was a googlectf challenge btw

i have 🅽🅾 clue how someone found this. github.com/phith0n/collis…

jamieantisocial's tweet image. i have 🅽🅾 clue how someone found this.

github.com/phith0n/collis…


Engacker𓅓 a reposté

On Windows 11 24H2, process & thread kernel objects can still be retrieved via a driver with physical memory R/W: extract CR3, get kernel VA/PA, locate nt!PsActiveProcessHead via an exported routine, then walk the list to grab each process’s kernel object. #driverexploitation

xacone_'s tweet image. On Windows 11 24H2, process & thread kernel objects can still be retrieved via a driver with physical memory R/W: extract CR3, get kernel VA/PA, locate nt!PsActiveProcessHead via an exported routine, then walk the list to grab each process’s kernel object.
#driverexploitation

Engacker𓅓 a reposté

Bug Hunters 🔥 Ever stumbled upon this weird message? "WebSockets request was expected" If you did, congratz! You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools 💥💥💥 Search for this message in Censys/FOFA and your automation 🤑

chux13786509's tweet image. Bug Hunters 🔥
Ever stumbled upon this weird message?
"WebSockets request was expected"

If you did, congratz!
You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools 💥💥💥
Search for this message in Censys/FOFA and your automation 🤑
chux13786509's tweet image. Bug Hunters 🔥
Ever stumbled upon this weird message?
"WebSockets request was expected"

If you did, congratz!
You just found a NodeJS server in debug mode, ready to quickly move on to RCE via simple DevTools 💥💥💥
Search for this message in Censys/FOFA and your automation 🤑

New technique: manual map injector bypass windows defender and EDRs/AVs youtu.be/pjGluW7-Zp0

Engacker's tweet image. New technique: manual map injector bypass windows defender and EDRs/AVs
youtu.be/pjGluW7-Zp0

Engacker𓅓 a reposté

obfus.h is the very powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity #Obfuscation #infosec github.com/DosX-dev/obfus…

horsicq's tweet image. obfus.h is the very powerfull compile-time obfuscator for C (win32/64). Supports virtualization, anti-debugging, control flow obfuscation and other code mutation techniques to prevent disassembly or decompilation. #CodeSecurity #Obfuscation #infosec

github.com/DosX-dev/obfus…

WinTip: Windows Media Player checking for a Mutex for running one process instance and if you open this mutex, the program won't run. JUST TRY IT if(!::CreateMutex(nullptr, FALSE, L"\Microsoft_WMP_70_CheckForOtherInstanceMutex")) return Error("cannot Create Mutex!!");

Engacker's tweet image. WinTip: Windows Media Player checking for a Mutex for running one process instance and if you open this mutex, the program won't run. JUST TRY IT
    if(!::CreateMutex(nullptr, FALSE, L"\Microsoft_WMP_70_CheckForOtherInstanceMutex"))
        return Error("cannot Create Mutex!!");

Engacker𓅓 a reposté

NTSockets - Downloading a file via HTTP using the NtCreateFile and NtDeviceIoControlFile syscalls x86matthew.com/view_post?id=n…

5mukx's tweet image. NTSockets - Downloading a file via HTTP using the NtCreateFile and NtDeviceIoControlFile syscalls

x86matthew.com/view_post?id=n…

Engacker𓅓 a reposté

PoC Exploit for the NTLM reflection SMB flaw CVE-2025-33073 github.com/mverschu/CVE-2…

cyb3rops's tweet image. PoC Exploit for the NTLM reflection SMB flaw CVE-2025-33073

github.com/mverschu/CVE-2…

Engacker𓅓 a reposté

Check out how I discover CVE-2025-33073 : RCE with NTLM reflectiv attack allowing authenticated user to compromise any machine without SMB signing enforced !

Microsoft just released the patch for CVE-2025-33073, a critical vulnerability allowing a standard user to remotely compromise any machine with SMB signing not enforced! Checkout the details in the blogpost by @yaumn_ and @wil_fri3d. synacktiv.com/publications/n…



Loading...

Something went wrong.


Something went wrong.