Andrei Scutariu
@xnand_
cybersecurity something
You might like
🔥🔥🚒🚨
I'm super happy🥳to announce my Advanced .NET Exploitation Training a 4 day training course on teaching you how to exploit advanced .NET enterprise targets 🔥, bypass mitigations, chain bugs🐞🪲 and pop shellz. more information can be found below summoning.team
This project is backdoored and fake. DO NOT RUN THIS POC! For an example, here is their exploit for CVE-2023-20871: github.com/ChriSanders22/… That code looks very similar hmm....
I published the writeup of "Exploiting Hibernate Injection (HQL) in "Order by" Clause (Oracle database)" which we found during an assessment. mannulinux.org/2023/03/exploi… Special Thanks to: @irsdl sir and @NomanRiffat bhai ji #injection #websecurity #bugbountytips #Pentesting
We've put out some guidance around securing AD environments from certificate abuse. labs.jumpsec.com/securing-again…
☀️ Summer Solstice philanthropy: I am making this mini-class available for free! 4 hours of deeply systematical theory & practice introduction on hypervisor vulns and how to find them, taught by a specialist researcher, bug hunter and pwner 🔥 How to claim your seat, thread 👉🏻
Upcoming this Saturday: mini-class “Hypervisor Security Research 101” with @alisaesage Details: zerodayengineering.com/blog/hyperviso… Booking: zerodayengineering.com/training/hyper…
Detecting known DLL hijacking and named pipe token impersonation attacks with Sysmon labs.jumpsec.com/detecting-know… #sysmon #blueteam #privesc #detection
Advisory CVE-2020-13769 – Ivanti Unified Endpoint Manager SQL injection labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #cve #sqli
Advisory CVE-2020-13774 – Ivanti Unified Endpoint Manager authenticated RCE via file upload labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #rce #cve
The new blog post by @_batsec_ is now live. Say goodbye to your event logs 😉 labs.jumpsec.com/2020/09/04/pwn… #RedTeam #PenTest #Hacking #BlueTeam #WhereAreMyLogs
SHAD0W, covert modular C2 framework labs.jumpsec.com/2020/06/03/sha… #C2 #redteam #infosec
uhm, some of them work, others doesn't, at least for me. I'm trying to access to intger overflow in C/C++ but get /#pubstosem14.
The Linux user experience.
Harry Potter sacré pervers
United States Trends
- 1. South Carolina 31K posts
- 2. #EubankBenn2 24.4K posts
- 3. Texas A&M 30.4K posts
- 4. Bama 9,915 posts
- 5. Beamer 8,961 posts
- 6. Ryan Williams 1,439 posts
- 7. Ty Simpson 2,035 posts
- 8. Makai Lemon N/A
- 9. Mateer 1,862 posts
- 10. Daniel Hill N/A
- 11. Heisman 8,574 posts
- 12. Arbuckle N/A
- 13. Michigan 42.4K posts
- 14. Oklahoma 18.2K posts
- 15. Aggies 8,980 posts
- 16. Sellers 13.8K posts
- 17. Cuevas 6,292 posts
- 18. Gio Reyna N/A
- 19. Northwestern 7,444 posts
- 20. Tate Sandell N/A
Something went wrong.
Something went wrong.