@He1l0world Profile picture

adnan jafar

@He1l0world

malware analyst | Red Team | Penetration Tester

Joined June 2021
Similar User
0xeleven@AFK photo

@0x1115

Tsof photo

@tsof_relox

WaterBucket photo

@DharaniSanjaiy

Kosta B. photo

@k0st8

しゃう photo

@NKO41675803

Solomon Nasara photo

@nasara_solomon

Divyesh Bhesaniya 🇮🇳 photo

@Divyesh4683

Delta Red photo

@D3lt4r3d

Mahesh Anthappagudem photo

@maheshag08

xThalach photo

@XThalach

🏃Snehal photo

@TodkarR

Luvious photo

@Luvious_

aibrahim photo

@AmadouI42724755

Kauan M. photo

@sql2njection

adnan jafar Reposted

How to change your life using monk mode (Man learn to late) //Thread//🧵

Inspirationwiz's tweet image. How to change your life using monk mode

(Man learn to late)

//Thread//🧵

adnan jafar Reposted

Today's Training Tuesday Highlight is @MosseInstitute! They have several 100% hands-on certifications related to DFIR, OSINT and Malware Analysis including: - Certified DFIR Specialist - Cyber Defense Forensics Analyst - Cyber Defense Incident Responder - Certified Threat…

DfirDiva's tweet image. Today's Training Tuesday Highlight is @MosseInstitute!

They have several 100% hands-on certifications related to DFIR, OSINT and Malware Analysis including:

- Certified DFIR Specialist
- Cyber Defense Forensics Analyst
- Cyber Defense Incident Responder
- Certified Threat…

adnan jafar Reposted

Last week, a copycat version of the popular open-source script #linPEAS was discovered to have a sneaky line of remote logging in it, this underscores the importance of checking over #opensource tools or scripts and verifying they're from the original source. In this clip,…


adnan jafar Reposted

Malware analysis is an exciting field that can be interesting, fun, and valuable for your cybersecurity career. In The InfoSec Survival Guide, Volume 3, @_JohnHammond has compiled a quick list of tools, tips, and advice to help you begin your journey! Tools: PeStudio -…

BHinfoSecurity's tweet image. Malware analysis is an exciting field that can be interesting, fun, and valuable for your cybersecurity career. In The InfoSec Survival Guide, Volume 3, @_JohnHammond  has compiled a quick list of tools, tips, and advice to help you begin your journey!

Tools:
PeStudio -…
BHinfoSecurity's tweet image. Malware analysis is an exciting field that can be interesting, fun, and valuable for your cybersecurity career. In The InfoSec Survival Guide, Volume 3, @_JohnHammond  has compiled a quick list of tools, tips, and advice to help you begin your journey!

Tools:
PeStudio -…
BHinfoSecurity's tweet image. Malware analysis is an exciting field that can be interesting, fun, and valuable for your cybersecurity career. In The InfoSec Survival Guide, Volume 3, @_JohnHammond  has compiled a quick list of tools, tips, and advice to help you begin your journey!

Tools:
PeStudio -…
BHinfoSecurity's tweet image. Malware analysis is an exciting field that can be interesting, fun, and valuable for your cybersecurity career. In The InfoSec Survival Guide, Volume 3, @_JohnHammond  has compiled a quick list of tools, tips, and advice to help you begin your journey!

Tools:
PeStudio -…

adnan jafar Reposted

how i unblurred the code from @CDisillusion

WOW, amazing! And scary. I guess you're getting a video shoutout!

CDisillusion's tweet image. WOW, amazing! And scary.
I guess you're getting a video shoutout!


adnan jafar Reposted

❤️🇵🇸 The martyred Yahya Sinwar now lives rent free in every Zionist's head.

jacksonhinklle's tweet image. ❤️🇵🇸 The martyred Yahya Sinwar now lives rent free in every Zionist's head.

adnan jafar Reposted

Malware code hidden inside an image in EXE file, reverse engineering analysis of a steganography method used to evade anti-virus. pelock.com/articles/code-… #malware #assembler #reversing #itsecurity #itsec #steganography #hacker #hacking #programming #programmer #virus #TechNews


adnan jafar Reposted

Write-up on 1-click Exploit in South Korea's #KakaoTalk mobile chat app allowed to steal access token and remotely exfiltrate all chat messages Issue is fixed, but @dschmidt0815 haven't received reward, because only Koreans are eligible to receive bounty😲 stulle123.github.io/posts/kakaotal…


adnan jafar Reposted
's tweet image. Network Evasion Techniques:

unprotect.it/category/netwo…

#C2 #framework #network #evasion #redteam #pwn

adnan jafar Reposted

Join me for a chat w/ Q&A time about the new CCNA V1.1 blueprint. We'll also dig in on a few of the more challenging new topics. Hosted by Global Knowledge (zurl.co/LLzW )! Registration page: zurl.co/DNwK Sept 19th at 11 AM US Eastern time. See you then!


adnan jafar Reposted

Hack the Orbit: Interactive Satellite CTF Online Workshop 🛰 cybernetix.academy/satellite-ctf-…

AngelinaTsuboi's tweet image. Hack the Orbit: Interactive Satellite CTF Online Workshop 🛰

cybernetix.academy/satellite-ctf-…

adnan jafar Reposted

"Hack ANY Cell Phone" - Hacker Shows How Easy It Is To Hack Your Cell Phone. @patrickbetdavid @0dayCTF


adnan jafar Reposted

💾 Save this video to quickly remember the differences.


adnan jafar Reposted

DeadPotato DeadPotato is a windows privilege escalation utility from the Potato family of exploits, leveraging the SeImpersonate right to obtain SYSTEM privileges. github.com/lypd0/DeadPota… #cybersecurity #infosec #Windows #privilegeescalation


adnan jafar Reposted

Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time. Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and…

cube0x0's tweet image. Over a year ago, I left my position at WithSecure to start a new journey, create something new, and do my own thing. Today, I'm excited to publicly announce what I've been working on all this time.

Introducing 0xC2, a cross-platform C2 framework targeting Windows, Linux, and…

adnan jafar Reposted

📢 12 Free Risk Assessment Resources Unlocking Insights, Tools, and Guidance for Safer Operations 🛡️ 𝟭. 𝗜𝗦𝗢 𝟮𝟳𝟬𝟬𝟱 (🔒 lnkd.in/gMKsx-uj) 𝟮. 𝗕𝘂𝗶𝗹𝗱𝗶𝗻𝗴 𝗮 𝗥𝗶𝘀𝗸 𝗠𝗮𝗻𝗮𝗴𝗲𝗺𝗲𝗻𝘁 𝗣𝗿𝗼𝗴𝗿𝗮𝗺 (🎥 lnkd.in/gRSvHpX7) 𝟯. 𝗡𝗜𝗦𝗧 𝟴𝟬𝟬-𝟯𝟬…


adnan jafar Reposted

Metasploit: Spyware generator in a pocket Attackers can generate, host and distribute malware only using a smartphone mobile-hacker.com/2024/06/20/net… #NetHunter


adnan jafar Reposted

Early days of SpaceX

From ELON CLIPS

adnan jafar Reposted

Today I have a great IT Audit Checklist suggestion for Active Directory❗️🤓 Don't forget to add it to your bookmarks.🤞🏻🌸 PDF Link: media.licdn.com/dms/document/m… #cybersecurity #infosec #activedirectory #windows #pentest #pentester #audit #activedirectorysecurity #checklist

brcyrr's tweet image. Today I have a great IT Audit Checklist suggestion for Active Directory❗️🤓 Don't forget to add it to your bookmarks.🤞🏻🌸

PDF Link: media.licdn.com/dms/document/m… 

#cybersecurity #infosec #activedirectory #windows  #pentest #pentester #audit #activedirectorysecurity #checklist

Loading...

Something went wrong.


Something went wrong.