@YourXKDLEE Profile picture

xkdlee

@YourXKDLEE

Hehe

Joined September 2022
Similar User
اِحسانشون photo

@esanshon

لوتوس× photo

@lotuspalik

🧣چایی خور اعظم photo

@itsHastooli

pediiii photo

@rudkouvskaya

🤞🏻🫡🇪🇸espanol photo

@tajoeluesti

∆va²⁸ photo

@ava_styliinson

•|رَهگُذر|• photo

@amir_saeidy

Ali photo

@Ali_akbarii2000

xkdlee Reposted

Not a #KNOXSS Pro user yet? Here's a 5% COUPON! 🤩👏 KNXHUNT05 5% OFF for our One Time Payment plans! (3, 6 or 12 months) ➡️ Like and share this one to get a chance to win a 100% OFF coupon next week! #GIVEAWAY🤯 Sign up now! 😎👇 knoxss.me #XSS made easy.


xkdlee Reposted

#KNOXSS 2nd Giveaway! ✅ Follow us ✅ Like and share this To enter a draw for one of the 5 6-months subscriptions we are offering! Want to find some vulns? Get one of our plans and test for #XSS consistently. Sign up now! knoxss.me Your best bet on XSS.

Tweet Image 1

Huge shoutout to @KN0X55! Found some XSS vulns during the trial period, and one of them got me a bounty today. Thanks for the amazing tool! #XSS #bugbounty

Tweet Image 1


xkdlee Reposted

🚨Alert🚨 CVE-2023-20126 #Cisco #SPA112 Forever-Day 🧷 hunter.how/list?searchVal… 👇🏻 Other Dorks 👇🏻 FOFA body="/image/cisco_logo_about.png" Shodan http.html:"/image/cisco_logo_about.png" Refer to a deep dive from @fullspectrumdev 💻 fullspectrum.dev/cisco-spa112-f… #Infosys #infosec

Tweet Image 1

xkdlee Reposted

From Local Admin to Domain Admin If you're a local admin and want to duplicate someone's Token and run a command for them, write everything in Delphi. I've tested the code with most of the AV/EDRs. Please give me feedback. github.com/foxlox/hypobry… #redteam #DuplicateTokenEx

Tweet Image 1
Tweet Image 2

xkdlee Reposted

A memory-based evasion technique which makes shellcode invisible from process start to end. github.com/lem0nSec/Shell… #Pentesting #CyberSecurity #Infosec

Tweet Image 1
Tweet Image 2

xkdlee Reposted

Rubber Ducky on Android Let me show you two ways how to enable HID interface on Android to execute Rubber Ducky scripts and avoid "Kernel not supported" error in Rucky app #BadUSB #Rucky #RubberDucky #nethunter #hid


xkdlee Reposted

⚔️ Web Hacker's Weapons A collection of cool tools used by Web hackers. github.com/hahwul/WebHack… #bugbounty #webhacking #infosec

Tweet Image 1

xkdlee Reposted

RouterSploit - Exploitation Framework for Embedded Devices that can run in #Termux Using payloads module, I was able to identify the weak webconsole password on tested router github.com/threat9/router… #wifi

Tweet Image 1
Tweet Image 2

xkdlee Reposted

cmd.exe /c "ping 127.0.0.1/../../../../../../../../../../windows/system32/calc.exe" 🤯🤯🤯🤯 hackingiscool.pl/cmdhijack-comm…

Tweet Image 1

xkdlee Reposted

🦆#QakBot thread hijacking -> geofenced URL (DGA) -> password protected archive -> iso -> lnk -> cmd -> dll Botnet: BB04 Campaign ID: 1666347556 Bazaar: bazaar.abuse.ch/browse/tag/166… Triage: tria.ge/221024-ldw41af…

Tweet Image 1
Tweet Image 2
Tweet Image 3

xkdlee Reposted

“unprivileged users with UID > INT_MAX can successfully execute any systemctl command” 😱 github.com/systemd/system…

Tweet Image 1

xkdlee Reposted

When attacking Windows AD, if you can find Python/Ubuntu subsystem on one host (you could even use Cygwin or install it w/ low privs using --no-admin) you can bring in @PythonResponder &/or Impacket by pip & use that host to exploit an entire network while bypassing AV/AM/IDS/IPS

Tweet Image 1

xkdlee Reposted

whoami.filippo.io">whoami.filippo.io, the SSH server that knows who you are, got some newly refreshed intel! Try it out! $ ssh whoami.filippo.io">whoami.filippo.io

Tweet Image 1

xkdlee Reposted

A little gift to all the pentesters out there... 🎁 All versions of Windows Server from 2008 R2 to 2019 are prone to a DLL hijacking in the %PATH% directories. 🔥 ☑️ Run as SYSTEM ☑️ No reboot required ☑️ Can be triggered by a normal user on demand 👉 itm4n.github.io/windows-server…


Loading...

Something went wrong.


Something went wrong.