hsecitx0's profile picture. offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC  | Phd student @ SSLab

Hsecit • ハムザ

@hsecitx0

offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC | Phd student @ SSLab

Luxury vs Budget: How to Experience Morocco at Any Price Point guidememorocco.com/blog/luxury-vs…


Hsecit • ハムザ 已轉發
theslowfactory's tweet image.

Hsecit • ハムザ 已轉發

Israel is a terrorist state

DrLoupis's tweet image. Israel is a terrorist state

Hsecit • ハムザ 已轉發

لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر #GAZA - 26 May #RAFAH

rosaadam0's tweet image. لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر 

#GAZA - 26 May
#RAFAH

Hsecit • ハムザ 已轉發

انا مقاطع لاي حاجة عندها علاقة بالمنتخب المغربي

🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦 La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : • Pepsi 🇺🇸 • AtlantaSanad 🇲🇦 • Dari 🇲🇦

JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦
JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦


Hsecit • ハムザ 已轉發

Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. Ceasefire now

motazazaiza9's tweet image. Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. 
Ceasefire now

Hsecit • ハムザ 已轉發

Sometimes bypassing SQL can be a problem, you can try this way payload ; 8%20or%207250%3d0725 sqlmap ; sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast #bugbountytip

ynsmroztas's tweet image. Sometimes bypassing SQL can be a problem, you can try this way
payload ;

8%20or%207250%3d0725

sqlmap ;
sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast
 #bugbountytip

Hsecit • ハムザ 已轉發

Yesterday in the hospital I met these amazing fans

motazazaiza9's tweet image. Yesterday in the hospital I met these amazing fans

Hsecit • ハムザ 已轉發

It’s about life or death now I did what I could We are surrounded by the Israeli tanks

motazazaiza9's tweet image. It’s about life or death now 
I did what I could 
We are surrounded by the Israeli tanks

Hsecit • ハムザ 已轉發

🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

jacksonhinklle's tweet image. 🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

Hsecit • ハムザ 已轉發

🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

jacksonhinklle's tweet image. 🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

Hsecit • ハムザ 已轉發

This is an absolutely dope mindmap for attacking AD. orange-cyberdefense.github.io/ocd-mindmaps/i… Source: github.com/Orange-Cyberde…

Jhaddix's tweet image. This is an absolutely dope mindmap for attacking AD. 

orange-cyberdefense.github.io/ocd-mindmaps/i…

Source: github.com/Orange-Cyberde…

Hsecit • ハムザ 已轉發

"ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end." #infosec #pentest #redteam github.com/lem0nSec/Shell…

CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…
CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…

Hsecit • ハムザ 已轉發

Do you?

SaraReyi's tweet image. Do you?

Hsecit • ハムザ 已轉發

I see no difference.

SaraReyi's tweet image. I see no difference.

Hsecit • ハムザ 已轉發

She passed away due to an internal bleeding 😢 #gaza #IsraelIsATerroristState

此推文已無法使用。

Hsecit • ハムザ 已轉發

Sonos One reverse engineering analysis HITB 2023 presentation by @bl4sty conference.hitb.org/files/hitbsecc… #sonos

0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos

Hsecit • ハムザ 已轉發

Wrote a new blog about building a host based recon methodology and the importance of recon on compromised hosts. trustedsec.com/blog/walking-t…


Hsecit • ハムザ 已轉發

Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

Loading...

Something went wrong.


Something went wrong.