@R3M0v3Sec Profile picture

break ;

@R3M0v3Sec

Joined August 2016
Similar User
WTF photo

@xxxxyyyy99

Adam Flatley photo

@FlatleyAdam

seantelligence photo

@niksadecimal

Goody537 photo

@Goody537

ckj123 photo

@ckj1232

Pflash Punk photo

@PflashPunk

St0rm85 photo

@St0rmNT85

break ; Reposted

Reverse Engineering and exploit development Download 100% Free For First 1000 User's.. Simply: 1. Follow (So I Will Dm) 📥 2. Like and Repost 3. Comment “ Send ” to receive your copies!! 📚

Tweet Image 1

break ; Reposted

Proxy Phishing is taking off to the degree that it seems to be becoming the rule and not the exception. Here is a video of how fast you can pull it off and with MFA bypass. For protection and detection this is better than anything I could write: jeffreyappel.nl/aitm-mfa-phish…


break ; Reposted

Playing dirty with AV/EDR/sandbox, part 4: the webserver compiles a new exe file each time you download it. And the exe downloads a new file from the same server and runs it. 😈 Enjoy C: github.com/gtworek/PSBits… EXE: hxxp://20230906t192146.ltiapmyzmjxrvrts.info/v4/whatever.exe

Tweet Image 1

break ; Reposted

microsoft-edge + ms-search + MSDT path traversal 0day = fun of 2-clicks (one click additional due to Protected View if docx is coming from remote btw).


break ; Reposted

webarchive > internal.domain.com > dirsearch > found .git/index file used gin to read the index file pip3 install gin gin <index file> found .env file opened > full of credentials access to their mysql database connect using #bugbounty


break ; Reposted

Bypassing most FILE Uploads filters for $$$$ * .htaccess <- upload htaccess * file.svg <- uploading svg = xss * file.SVg <- must try case mismatch * file.png.svg * file.php%00.png * file.png' or '1'='1 * ../../file.png * file.'svg <- invalid ext. #bugbountytips #BugBounty


break ; Reposted

Some github search keywords. Assuming target(.)com *"target(.)com" password *"target(.)com" "pass" 'email' *"target(.)com" "api" *"target(.)com" FTP *"target(.)com" SMTP *"target(.)com" LDAP *"target(.)com" PEM (For Keys) If found nothing try to change it.


break ; Reposted

Web Apps Testing: Focuses on gathering more info about the app and mapping out the network / infrastructure where the app is hosted. Popular tools commonly used during Web Apps Testing include: W3af Burp Suite SQLMap Metasploit Hydra John Ripper Skipfish Ratproxy Wfuzz Watcher


break ; Reposted

Dump AES keys from wireless Logitech receivers using Chrome Browser. Demo page: mame82.github.io/munifying-web/ Source: github.com/mame82/munifyi…


break ; Reposted

Kurt Cobain died 25 years ago today cnn.it/2K9lJ8Z

Tweet Image 1

United States Trends
Loading...

Something went wrong.


Something went wrong.