@MAletaibi Profile picture

M.S.A

@MAletaibi

Joined January 2015
Similar User
Usman Mansha photo

@UsmanMansha420

𝖠𝗆𝖺𝗅 photo

@iAl_8i

𝑲𝑯 🥈 photo

@lpx8r

Anthony photo

@Anthony95202666

Survival cupcake photo

@_sls_

Meet Patel photo

@J3rry1729

مغترب في  USA photo

@arbi141033

M.S.A Reposted
's tweet image. 👇🫣
medium.com/@abhirupkonwar…

M.S.A Reposted

Gained a reverse shell through a PNG file using I-Espresso and Xploitra. Curious to try it yourself? Check the links below ⬇️ 🔗 I-Espresso: github.com/AnonKryptiQuz/… 🔗 Xploitra: github.com/AnonKryptiQuz/…


M.S.A Reposted

Another day another bug 🔥 Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file! #BugBounty #bugbountytips #Hacking

chux13786509's tweet image. Another day another bug 🔥
Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file!
#BugBounty #bugbountytips #Hacking
chux13786509's tweet image. Another day another bug 🔥
Just got a webshell uploaded with the Exiftool trick of injecting the payload into a real JPEG file!
#BugBounty #bugbountytips #Hacking

M.S.A Reposted

exploit + lab setup for CVE-2024-45519 github.com/Chocapikk/CVE-…

Chocapikk_'s tweet image. exploit + lab setup for CVE-2024-45519

github.com/Chocapikk/CVE-…

M.S.A Reposted

There are at least 75,000 exposed CUPS daemons on the Internet: shodan.io/search/report?…

shodanhq's tweet image. There are at least 75,000 exposed CUPS daemons on the Internet: shodan.io/search/report?…

M.S.A Reposted

Attacking UNIX Systems via CUPS, Part I evilsocket.net/2024/09/26/Att…


M.S.A Reposted

Linux rsync command examples

sysxplore's tweet image. Linux rsync command examples

M.S.A Reposted

When 4 CVEs combine, they form a 9.8 CVSS Megazord of vulnerabilities! Time to morph into action and patch those bad boys up! 💥🤖 Great work out there by @watchtowrcyber - supportportal.juniper.net/s/article/2023… - labs.watchtowr.com/cve-2023-36844… #GoGoPatchRangers CVE-2023-36844 CVE-2023-36845…

M_haggis's tweet image. When 4 CVEs combine, they form a 9.8 CVSS Megazord of vulnerabilities! Time to morph into action and patch those bad boys up! 💥🤖
Great work out there by @watchtowrcyber 

- supportportal.juniper.net/s/article/2023…
- labs.watchtowr.com/cve-2023-36844…

#GoGoPatchRangers
CVE-2023-36844
CVE-2023-36845…

M.S.A Reposted

Today's Bug Bounty Blogs #18 1)Hitting the jackpot with RCE! medium.com/@gokulsspace/h… 2)How I Discovered a Critical Vulnerability that Most Bug Hunters Missed….🧐 dkcyberz.medium.com/how-i-discover… 3)“Like” Bypass on Customer Reviews — €500 bounty medium.com/@asharm.khan7/… 4)Juniper…

hetmehtaa's tweet image. Today's Bug Bounty Blogs #18

1)Hitting the jackpot with RCE!
medium.com/@gokulsspace/h…

2)How I Discovered a Critical Vulnerability that Most Bug Hunters Missed….🧐
dkcyberz.medium.com/how-i-discover…

3)“Like” Bypass on Customer Reviews — €500 bounty
medium.com/@asharm.khan7/…

4)Juniper…

M.S.A Reposted

New blog with more advanced cyberchef tricks! 🔥 Looking at Flow Control, Subsections and how you can deal with alternating math operations. embeeresearch.io/advanced-cyber… #malware #Cyberchef


M.S.A Reposted

Hey, hackers! I hope this note is bookmarked on your belt! It contains awesome pdfs including: Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED) - Red team Operations - Reverse engineering content - Red Team x Blue team - Practical social engineering - Windows…

TheMsterDoctor1's tweet image. Hey, hackers! 

I hope this note is bookmarked on your belt! 
It contains awesome pdfs including: 

Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

- Red team Operations
- Reverse engineering content
- Red Team x Blue team
 - Practical social engineering
- Windows…
TheMsterDoctor1's tweet image. Hey, hackers! 

I hope this note is bookmarked on your belt! 
It contains awesome pdfs including: 

Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

- Red team Operations
- Reverse engineering content
- Red Team x Blue team
 - Practical social engineering
- Windows…
TheMsterDoctor1's tweet image. Hey, hackers! 

I hope this note is bookmarked on your belt! 
It contains awesome pdfs including: 

Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

- Red team Operations
- Reverse engineering content
- Red Team x Blue team
 - Practical social engineering
- Windows…
TheMsterDoctor1's tweet image. Hey, hackers! 

I hope this note is bookmarked on your belt! 
It contains awesome pdfs including: 

Free Offensive Security Notes (OSCP, OSWE, OSEP, OSED)

- Red team Operations
- Reverse engineering content
- Red Team x Blue team
 - Practical social engineering
- Windows…

M.S.A Reposted

If you have access to #jenkins dashboard use below Script Console cmd for poc ``` def passwdFile = new File("/etc/passwd") println passwdFile.text ``` #P1 #bugbountytips #bugbounty

krishnsec's tweet image. If you have access to #jenkins dashboard 
use below Script Console cmd for poc
```
def passwdFile = new File("/etc/passwd")
println passwdFile.text
```
#P1 #bugbountytips #bugbounty

M.S.A Reposted

So far, I have written 706 pages to help the security community. My goal will be writing new articles of the Exploiting Reversing Series (ERS), which is focused on security research. However, I am planning to write one or two additional articles of my previous series MAS (Malware…

ale_sp_brazil's tweet image. So far, I have written 706 pages to help the security community. My goal will be writing new articles of the Exploiting Reversing Series (ERS), which is focused on security research. However, I am planning to write one or two additional articles of my previous series MAS (Malware…

M.S.A Reposted

Created another write-up, this time on NTLM relay attacks to LDAP(S), including details of WebClient coercion, NTLM transport vulnerabilities, and finally device takeover after achieving authentication. You can read about it on my blog :) logan-goins.com/2024-07-23-lda…


M.S.A Reposted

Advanced SQL Injection Techniques now available in GitBook. Make a copy/ Archive / Convert to PDF before they report this too :). #bugbountytip #BugBounty #SQLInjection #SQLi nav1n0x.gitbook.io/advanced-sql-i…


M.S.A Reposted

🚨 Active Directory Hacking ⚡ This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell. Credit: github.com/drak3hft7/Chea… #ActiveDirectory #AD #redteam #Pentesting #Hacking #infosec #infosecurity #Windows

7h3h4ckv157's tweet image. 🚨 Active Directory Hacking ⚡

This cheat sheet contains common enumeration and attack methods for Windows Active Directory with the use of powershell.

Credit: github.com/drak3hft7/Chea…

#ActiveDirectory #AD #redteam #Pentesting #Hacking #infosec #infosecurity #Windows

M.S.A Reposted

LOLBins (Complete Guide to Living Off the Land Binaries) LOLBins are ingenious weapons used in cyber security. These pre-installed system utilities can be weaponized to evade detection, making them a favorite in sophisticated hackers' toolkits 🔗Read more: buff.ly/4ewux2S

GotoNathan's tweet image. LOLBins (Complete Guide to Living Off the Land Binaries)
LOLBins are ingenious weapons used in cyber security. These pre-installed system utilities can be weaponized to evade detection, making them a favorite in sophisticated hackers' toolkits
🔗Read more: buff.ly/4ewux2S

Loading...

Something went wrong.


Something went wrong.