hsecitx0's profile picture. offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC  | Phd student @ SSLab

Hsecit • ハムザ

@hsecitx0

offense Cybersecurity engineer @Webhelp_fr | REAM | 0xC | Phd student @ SSLab

Working on DowndetectorDetector because even the outage snitch needs someone to snitch on it #cloudflare #Cloudflare

hsecitx0's tweet image. Working on DowndetectorDetector because even the outage snitch needs someone to snitch on it

#cloudflare #Cloudflare

Hsecit • ハムザ รีโพสต์แล้ว
theslowfactory's tweet image.

Hsecit • ハムザ รีโพสต์แล้ว

Israel is a terrorist state

DrLoupis's tweet image. Israel is a terrorist state

Hsecit • ハムザ รีโพสต์แล้ว

لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر #GAZA - 26 May #RAFAH

rosaadam0's tweet image. لاول مره بطلب من الاصدقاء اعاده نشر الصوره على حساباتهم. جزيل الشكر 

#GAZA - 26 May
#RAFAH

Hsecit • ハムザ รีโพสต์แล้ว

انا مقاطع لاي حاجة عندها علاقة بالمنتخب المغربي

🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦 La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : • Pepsi 🇺🇸 • AtlantaSanad 🇲🇦 • Dari 🇲🇦

JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦
JMA_Morocco's tweet image. 🚨 | OFFICIEL : McDonald's devient le nouveau sponsor de la Fédération Royale Marocaine de Football. 🇲🇦

La FRMF a signé de nouveaux accords avec les entreprises suivantes plus tôt cette année : 

• Pepsi 🇺🇸
• AtlantaSanad 🇲🇦
• Dari 🇲🇦


Hsecit • ハムザ รีโพสต์แล้ว

Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. Ceasefire now

motazazaiza9's tweet image. Fuck the ICJ and the whole world governments. We lost our trust in every decision maker in the world. 
Ceasefire now

Hsecit • ハムザ รีโพสต์แล้ว

Sometimes bypassing SQL can be a problem, you can try this way payload ; 8%20or%207250%3d0725 sqlmap ; sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast #bugbountytip

ynsmroztas's tweet image. Sometimes bypassing SQL can be a problem, you can try this way
payload ;

8%20or%207250%3d0725

sqlmap ;
sqlmap -u 'h t t p :// domain[.]com / anyfile.asp?id_test=8%20or%207250%3d07250' --dbs --random-agent ignore=500 - -code=200 -T tablename --columns -- no-cast
 #bugbountytip

Hsecit • ハムザ รีโพสต์แล้ว

Yesterday in the hospital I met these amazing fans

motazazaiza9's tweet image. Yesterday in the hospital I met these amazing fans

Hsecit • ハムザ รีโพสต์แล้ว

It’s about life or death now I did what I could We are surrounded by the Israeli tanks

motazazaiza9's tweet image. It’s about life or death now 
I did what I could 
We are surrounded by the Israeli tanks

Hsecit • ハムザ รีโพสต์แล้ว

🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

jacksonhinklle's tweet image. 🚨🇵🇸 KEEP #ElonGoToGaza TRENDING!

Hsecit • ハムザ รีโพสต์แล้ว

🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

jacksonhinklle's tweet image. 🚨🇵🇸 Hamas just invited Elon Musk to visit Gaza. #ElonGoToGaza

Hsecit • ハムザ รีโพสต์แล้ว

This is an absolutely dope mindmap for attacking AD. orange-cyberdefense.github.io/ocd-mindmaps/i… Source: github.com/Orange-Cyberde…

Jhaddix's tweet image. This is an absolutely dope mindmap for attacking AD. 

orange-cyberdefense.github.io/ocd-mindmaps/i…

Source: github.com/Orange-Cyberde…

Hsecit • ハムザ รีโพสต์แล้ว

"ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end." #infosec #pentest #redteam github.com/lem0nSec/Shell…

CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…
CyberWarship's tweet image. "ShellGhost: A memory-based evasion technique which makes shellcode invisible from process start to end."

#infosec #pentest #redteam 
github.com/lem0nSec/Shell…

Hsecit • ハムザ รีโพสต์แล้ว

Do you?

SaraReyi's tweet image. Do you?

Hsecit • ハムザ รีโพสต์แล้ว

I see no difference.

SaraReyi's tweet image. I see no difference.

Hsecit • ハムザ รีโพสต์แล้ว

She passed away due to an internal bleeding 😢 #gaza #IsraelIsATerroristState

ทวีตนี้ไม่สามารถใช้งานได้อีกต่อไป

Hsecit • ハムザ รีโพสต์แล้ว

Sonos One reverse engineering analysis HITB 2023 presentation by @bl4sty conference.hitb.org/files/hitbsecc… #sonos

0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos
0xor0ne's tweet image. Sonos One reverse engineering analysis
HITB 2023 presentation by @bl4sty

conference.hitb.org/files/hitbsecc…

#sonos

Hsecit • ハムザ รีโพสต์แล้ว

Wrote a new blog about building a host based recon methodology and the importance of recon on compromised hosts. trustedsec.com/blog/walking-t…


Hsecit • ハムザ รีโพสต์แล้ว

Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n_r0's tweet image. Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). 

Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.

Loading...

Something went wrong.


Something went wrong.