Similar User
@esanshon
@lotuspalik
@itsHastooli
@rudkouvskaya
@tajoeluesti
@ava_styliinson
@amir_saeidy
@Ali_akbarii2000
Not a #KNOXSS Pro user yet? Here's a 5% COUPON! 🤩👏 KNXHUNT05 5% OFF for our One Time Payment plans! (3, 6 or 12 months) ➡️ Like and share this one to get a chance to win a 100% OFF coupon next week! #GIVEAWAY🤯 Sign up now! 😎👇 knoxss.me #XSS made easy.
#KNOXSS 2nd Giveaway! ✅ Follow us ✅ Like and share this To enter a draw for one of the 5 6-months subscriptions we are offering! Want to find some vulns? Get one of our plans and test for #XSS consistently. Sign up now! knoxss.me Your best bet on XSS.
Huge shoutout to @KN0X55! Found some XSS vulns during the trial period, and one of them got me a bounty today. Thanks for the amazing tool! #XSS #bugbounty
🚨Alert🚨 CVE-2023-20126 #Cisco #SPA112 Forever-Day 🧷 hunter.how/list?searchVal… 👇🏻 Other Dorks 👇🏻 FOFA body="/image/cisco_logo_about.png" Shodan http.html:"/image/cisco_logo_about.png" Refer to a deep dive from @fullspectrumdev 💻 fullspectrum.dev/cisco-spa112-f… #Infosys #infosec
From Local Admin to Domain Admin If you're a local admin and want to duplicate someone's Token and run a command for them, write everything in Delphi. I've tested the code with most of the AV/EDRs. Please give me feedback. github.com/foxlox/hypobry… #redteam #DuplicateTokenEx
A memory-based evasion technique which makes shellcode invisible from process start to end. github.com/lem0nSec/Shell… #Pentesting #CyberSecurity #Infosec
Pic of the Day #infosec #cybersecurity #cybersecuritytips #pentesting #cybersecurityawareness #informationsecurity
Rubber Ducky on Android Let me show you two ways how to enable HID interface on Android to execute Rubber Ducky scripts and avoid "Kernel not supported" error in Rucky app #BadUSB #Rucky #RubberDucky #nethunter #hid
⚔️ Web Hacker's Weapons A collection of cool tools used by Web hackers. github.com/hahwul/WebHack… #bugbounty #webhacking #infosec
RouterSploit - Exploitation Framework for Embedded Devices that can run in #Termux Using payloads module, I was able to identify the weak webconsole password on tested router github.com/threat9/router… #wifi
“When Cookie Hijacking + HTML Injection become dangerous” by Daniel V link.medium.com/nOFYz7HwFT
cmd.exe /c "ping 127.0.0.1/../../../../../../../../../../windows/system32/calc.exe" 🤯🤯🤯🤯 hackingiscool.pl/cmdhijack-comm…
🦆#QakBot thread hijacking -> geofenced URL (DGA) -> password protected archive -> iso -> lnk -> cmd -> dll Botnet: BB04 Campaign ID: 1666347556 Bazaar: bazaar.abuse.ch/browse/tag/166… Triage: tria.ge/221024-ldw41af…
“unprivileged users with UID > INT_MAX can successfully execute any systemctl command” 😱 github.com/systemd/system…
When attacking Windows AD, if you can find Python/Ubuntu subsystem on one host (you could even use Cygwin or install it w/ low privs using --no-admin) you can bring in @PythonResponder &/or Impacket by pip & use that host to exploit an entire network while bypassing AV/AM/IDS/IPS
whoami.filippo.io">whoami.filippo.io, the SSH server that knows who you are, got some newly refreshed intel! Try it out! $ ssh whoami.filippo.io">whoami.filippo.io
A little gift to all the pentesters out there... 🎁 All versions of Windows Server from 2008 R2 to 2019 are prone to a DLL hijacking in the %PATH% directories. 🔥 ☑️ Run as SYSTEM ☑️ No reboot required ☑️ Can be triggered by a normal user on demand 👉 itm4n.github.io/windows-server…
United States Trends
- 1. Good Saturday 19,6 B posts
- 2. Pearl Harbor 7.179 posts
- 3. Jeanty 40,6 B posts
- 4. Heisman 27,6 B posts
- 5. #VancouverTSTheErasTour 82,3 B posts
- 6. #Caturday 3.099 posts
- 7. Never Grow Up x The Best Day 4.192 posts
- 8. Travis Head 30,7 B posts
- 9. Rohit 50,5 B posts
- 10. Maddow 20,6 B posts
- 11. #INDvsAUS 67,6 B posts
- 12. Boise 24,5 B posts
- 13. sabrina 106 B posts
- 14. Tulsi 44 B posts
- 15. Army 322 B posts
- 16. Siraj 49 B posts
- 17. Chum 17,1 B posts
- 18. Iron Fist 7.439 posts
- 19. Trae 33 B posts
- 20. Curry 28,1 B posts
Something went wrong.
Something went wrong.