hsecitx0's profile picture. offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC  | Phd student @ SSLab

Hsecit • ハムザ

@hsecitx0

offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC | Phd student @ SSLab

Luxury vs Budget: How to Experience Morocco at Any Price Point guidememorocco.com/blog/luxury-vs…


Hsecit • ハムザ reposted
theslowfactory's tweet image.

Hsecit • ハムザ reposted

Israel is a terrorist state

DrLoupis's tweet image. Israel is a terrorist state

Hsecit • ハムザ reposted

لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر #GAZA - 26 May #RAFAH

rosaadam0's tweet image. لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر 

#GAZA - 26 May
#RAFAH

Hsecit • ハムザ reposted

انا مقاطع لاي حاجة عندها علاقة بالمنتخب المغربي

🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦 La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : • Pepsi 🇺🇸 • AtlantaSanad 🇲🇦 • Dari 🇲🇦

JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦
JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦


Hsecit • ハムザ reposted

Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. Ceasefire now

motazazaiza9's tweet image. Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. 
Ceasefire now

Hsecit • ハムザ reposted

Sometimes bypassing SQL can be a problem, you can try this way payload ; 8%20or%207250%3d0725 sqlmap ; sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast #bugbountytip

ynsmroztas's tweet image. Sometimes bypassing SQL can be a problem, you can try this way
payload ;

8%20or%207250%3d0725

sqlmap ;
sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast
 #bugbountytip

Hsecit • ハムザ reposted

Yesterday in the hospital I met these amazing fans

motazazaiza9's tweet image. Yesterday in the hospital I met these amazing fans

Hsecit • ハムザ reposted

It’s about life or death now I did what I could We are surrounded by the Israeli tanks

motazazaiza9's tweet image. It’s about life or death now 
I did what I could 
We are surrounded by the Israeli tanks

Hsecit • ハムザ reposted

🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

jacksonhinklle's tweet image. 🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

Hsecit • ハムザ reposted

🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

jacksonhinklle's tweet image. 🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

Hsecit • ハムザ reposted

This is an absolutely dope mindmap for attacking AD. orange-cyberdefense.github.io/ocd-mindmaps/i… Source: github.com/Orange-Cyberde…

Jhaddix's tweet image. This is an absolutely dope mindmap for attacking AD. 

orange-cyberdefense.github.io/ocd-mindmaps/i…

Source: github.com/Orange-Cyberde…

Hsecit • ハムザ reposted

"ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end." #infosec #pentest #redteam github.com/lem0nSec/Shell…

CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…
CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…

Hsecit • ハムザ reposted

Do you?

SaraReyi's tweet image. Do you?

Hsecit • ハムザ reposted

I see no difference.

SaraReyi's tweet image. I see no difference.

Hsecit • ハムザ reposted

She passed away due to an internal bleeding 😢 #gaza #IsraelIsATerroristState

This post is unavailable.

Hsecit • ハムザ reposted

Sonos One reverse engineering analysis HITB 2023 presentation by @bl4sty conference.hitb.org/files/hitbsecc… #sonos

0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos

Hsecit • ハムザ reposted

Wrote a new blog about building a host based recon methodology and the importance of recon on compromised hosts. trustedsec.com/blog/walking-t…


Hsecit • ハムザ reposted

Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

Loading...

Something went wrong.


Something went wrong.