@MMrbsc Profile picture

M

@MMrbsc

Curious by design

Joined July 2014
Similar User
Mohammad Tahami photo

@moimmortal

Knight photo

@Knight_Kore

big g photo

@cryingindaklub

willstefaniak photo

@willstefaniak

John Rodriguez (JRod) photo

@1UPCreative

Born Free photo

@robbiede88

Raymond photo

@RayGu616

Live photo

@Live2022R

Andrea Grande photo

@agranderoyo

Arn photo

@AIheka

Etnik photo

@etnikthaci

Mike Hawkener photo

@seterpellars

lovahboy222 photo

@Lordcostanza

M Reposted

This tool hijacks all your browser data by default, dumping information from every browser on the system, including passwords, cookies, bookmarks, history, downloads, and more.

hack_sparo's tweet image. This tool hijacks all your browser data by default, dumping information from every browser on the system, including passwords, cookies, bookmarks, history, downloads, and more.

M Reposted

Hey Hackers! 👋🏻 Faster Google Dorking source: dorksearch.com NB: Content Sharing != Content Stealing

7h3h4ckv157's tweet image. Hey Hackers! 👋🏻 

Faster Google Dorking 
source: dorksearch.com 

NB: Content Sharing != Content Stealing

M Reposted

50 web app hacking exploits every hacker should know: Broken Authentication Session Hijacking Session Fixation Credential Stuffing Brute Force Attack Insecure Password Storage Account Takeover (ATO) Multi-factor Authentication Bypass OAuth Misconfiguration Token Replay Attacks…


M Reposted

This tool can extract all saved passwords from Firefox, including website, username, and password, using just the Firefox profile directory.


M Reposted

How Windows access tokens work. #ThreatHunting #DFIR #Windows

ACEResponder's tweet image. How Windows access tokens work.

#ThreatHunting #DFIR #Windows

M Reposted

10 dark web websites that you won’t find on Google: 🧵

heyAlfaiz's tweet image. 10 dark web websites that you won’t find on Google: 🧵

M Reposted

BlueSpy - PoC to record audio from a Bluetooth device : github.com/TarlogicSecuri… Spying on Bluetooth conversations : tarlogic.com/blog/bluespy-s…

binitamshah's tweet image. BlueSpy - PoC to record audio from a Bluetooth device : github.com/TarlogicSecuri… 

Spying on Bluetooth conversations : tarlogic.com/blog/bluespy-s…

M Reposted

Btw, you don't need a Flipper Zero to "hack" dumb radio protocols. The piece of wire is enough. Check out how to receive and decode 433MHz radio signal just with a PC sound card.


M Reposted

GitHub - danieldurnea/FBI-tools: 🕵️ OSINT Tools for gathering information and actions forensics 🕵️ github.com/danieldurnea/F…


M Reposted

Here's a short write-up on using PS credentials for scheduled task privilege escalation. Home-Grown Red Team: Local Admin Phishing For Privilege and Persistence link.medium.com/11f7fIFJKHb


M Reposted

I just published Home-Grown Red Team: Taking On A Hardened Windows System link.medium.com/JPqKEjUMFHb


M Reposted

All Harriet modules have been updated to get past Defender. Perfect for CTFs or lab evasion. Compile on Kali or upgrade your Mingw version past 11. Enjoy! github.com/assume-breach/…


M Reposted

New: inside the underground site where "neural networks" churn out fake IDs - I tested, made two IDs in minutes - used one to successfully bypass the identity verification check on a cryptocurrency exchange - massive implications for crime, cybersecurity 404media.co/inside-the-und…

josephfcox's tweet image. New: inside the underground site where "neural networks" churn out fake IDs
- I tested, made two IDs in minutes 
- used one to successfully bypass the identity verification check on a cryptocurrency exchange 
- massive implications for crime, cybersecurity
404media.co/inside-the-und…

M Reposted

Guide to hunt #opendir malware with @censysio and @abuse_ch urlhaus. Step one 1: find a unique malware name. I am using hxxps://urlhaus.abuse.ch/browse/ in this case. (picture 1/2) See comments for next steps.

banthisguy9349's tweet image. Guide to hunt #opendir malware with @censysio and @abuse_ch urlhaus. 

Step one 1: find a unique malware name. I am using hxxps://urlhaus.abuse.ch/browse/ in this case. (picture 1/2)

See comments for next steps.
banthisguy9349's tweet image. Guide to hunt #opendir malware with @censysio and @abuse_ch urlhaus. 

Step one 1: find a unique malware name. I am using hxxps://urlhaus.abuse.ch/browse/ in this case. (picture 1/2)

See comments for next steps.

M Reposted

With this season of Hell's Kitchen being over, I thought I would do a follow up to my post based on some of the feedback I got. I won't do another one. Next Level Chef starts this week. link.medium.com/o6xG0vaBOGb


M Reposted

"Good tools can help you find bugs before others do – but only if you know how to properly use them." 🕵️ Finding hidden parameters unnoticed by most of hunters will help you to get more bugs and that's where Arjun comes in. Learn how to effectively use Arjun in 10 steps 👇

thebinarybot's tweet image. "Good tools can help you find bugs before others do – but only if you know how to properly use them."

🕵️ Finding hidden parameters unnoticed by most of hunters will help you to get more bugs and that's where Arjun comes in.

Learn how to effectively use Arjun in 10 steps 👇

M Reposted

We spend all week researching the top AI tools so you don't have to... Get insights, tools, and news for free when you join our community of 150,000+ readers. Click the image below to subscribe for free 👇


Loading...

Something went wrong.


Something went wrong.