xnand_'s profile picture. cybersecurity something

Andrei Scutariu

@xnand_

cybersecurity something

🔥🔥🚒🚨

I'm super happy🥳to announce my Advanced .NET Exploitation Training a 4 day training course on teaching you how to exploit advanced .NET enterprise targets 🔥, bypass mitigations, chain bugs🐞🪲 and pop shellz. more information can be found below summoning.team



Andrei Scutariu reposted

This project is backdoored and fake. DO NOT RUN THIS POC! For an example, here is their exploit for CVE-2023-20871: github.com/ChriSanders22/… That code looks very similar hmm....


Andrei Scutariu reposted

I published the writeup of "Exploiting Hibernate Injection (HQL) in "Order by" Clause (Oracle database)" which we found during an assessment. mannulinux.org/2023/03/exploi… Special Thanks to: @irsdl sir and @NomanRiffat bhai ji #injection #websecurity #bugbountytips #Pentesting


Andrei Scutariu reposted

We've put out some guidance around securing AD environments from certificate abuse. labs.jumpsec.com/securing-again…


Andrei Scutariu reposted

☀️ Summer Solstice philanthropy: I am making this mini-class available for free! 4 hours of deeply systematical theory & practice introduction on hypervisor vulns and how to find them, taught by a specialist researcher, bug hunter and pwner 🔥 How to claim your seat, thread 👉🏻

Upcoming this Saturday: mini-class “Hypervisor Security Research 101” with @alisaesage Details: zerodayengineering.com/blog/hyperviso… Booking: zerodayengineering.com/training/hyper…



Andrei Scutariu reposted

Detecting known DLL hijacking and named pipe token impersonation attacks with Sysmon labs.jumpsec.com/detecting-know… #sysmon #blueteam #privesc #detection


Andrei Scutariu reposted

Advisory CVE-2020-13769 – Ivanti Unified Endpoint Manager SQL injection labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #cve #sqli


Andrei Scutariu reposted

Advisory CVE-2020-13774 – Ivanti Unified Endpoint Manager authenticated RCE via file upload labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #rce #cve


Andrei Scutariu reposted

The new blog post by @_batsec_ is now live. Say goodbye to your event logs 😉 labs.jumpsec.com/2020/09/04/pwn… #RedTeam #PenTest #Hacking #BlueTeam #WhereAreMyLogs


Andrei Scutariu reposted

SHAD0W, covert modular C2 framework labs.jumpsec.com/2020/06/03/sha… #C2 #redteam #infosec

JumpsecLabs's tweet image. SHAD0W, covert modular C2 framework
labs.jumpsec.com/2020/06/03/sha…
#C2 #redteam #infosec

oh, right, i'll try it. Thank you 😁


uhm, some of them work, others doesn't, at least for me. I'm trying to access to intger overflow in C/C++ but get /#pubstosem14.


@johnregehr hey, many links to papers on your website are not redirecting anywhere...


Andrei Scutariu reposted

The Linux user experience.


Andrei Scutariu reposted

Harry Potter sacré pervers


Andrei Scutariu reposted

Life does things


Loading...

Something went wrong.


Something went wrong.