@concabe_ Profile picture

Harry Do

@concabe_

Joined June 2023
Similar User
Uni 🌱☕️ | Cafe Owner PNGTuber photo

@UniACHCorn

GS Bloodstock photo

@bloodstock_gs

Albert Jones photo

@ALjonesphotog

NAGAH MOHAMED🇵🇸 photo

@nagahmohamed75

Sierra🇵🇸🇺🇦🏳️‍🌈 photo

@sierramoaiemoji

Harry Do Reposted

🎁 End of Year Giveaway 🎁 Hack The Box 6-month VIP+ x1 - Follow, Like, and Retweet to join! - Winner will be picked randomly on December. #hackthebox #giveaway #projectsekaictf

Tweet Image 1

Harry Do Reposted

Active Directory OSCP Edition 🚨 Source: xmind.app/m/vQuTSG


Harry Do Reposted

Session Takeover via Pass the Challenge powered by @mcbroom_evan's lsa-whisperer and @ly4k_'s impacket fork.

Tweet Image 1

Harry Do Reposted

Here is our slides for Zer0con 2024, Escaping the Sandbox (Chrome and Adobe Pdf Reader) on Windows sites.google.com/site/zhiniangp…

Tweet Image 1

Harry Do Reposted

It's time ! @BreizhCTF 2024's resources are now open source ! Challenges, solves, full scoreboard, everything ! Feel free to have a look :) (cc @BretagneBDI @_SaxX_) github.com/BreizhCTF/brei…


Harry Do Reposted

Impact increased :) fetched the private ssh key CVE-2024-24919 #CheckPoint #SSLVpn @h4x0r_dz

Tweet Image 1

Harry Do Reposted

🚨Alert🚨CVE-2024-30043: Abusing URL Parsing Confusion to Exploit XXE on SharePoint Server And Cloud 🔥PoC:zerodayinitiative.com/blog/2024/5/29… ⚠This XXE injection vulnerability, one of the craziest XXEs that @chudyPB has ever seen ,allows you to: ·Read files with SharePoint Farm Service…

Tweet Image 1

My SharePoint XXE blog is live. URL scheme confusion allowed to bypass security measures delivered by XmlSecureResolver :)



Harry Do Reposted

THIS TOOL IS SO ADVANCE AND POWERFUL TO DETECT CSRF WITH MANY TECHNIQUES ALSO IT GIVES YOU HTML POC TO EXPLOIT THAT...

Tweet Image 1

Harry Do Reposted

New blogpost! In this post we analyse CVE-2023-29300, a pre-auth RCE in Adobe ColdFusion via unsafe Java Reflection invocation. blog.projectdiscovery.io/adobe-coldfusi…


Harry Do Reposted

Reproduced the CVE-2023-46747 F5 Big-IP RCE via AJP smuggling. Props to @praetorianlabs for identifying this cool bug. @pdnuclei template dropping soon. Time to sleep😴 #f5-rce #CVE-2023-46747

Tweet Image 1

Reproduced the AJP request Smuggling to access /tmui/* resources directly. Very interesting bug indeed, need to further look into post-exploitation. Until next time😴

Tweet Image 1


Harry Do Reposted

wild stuff re: xz/liblzma backdoor news.ycombinator.com/item?id=398658…

Tweet Image 1

Harry Do Reposted

New blog post is up... Identity Providers for RedTeamers. This follows my #SOCON2024 talk, and provides the technicals behind the presentation, looking at other IdP's and what techniques are effective beyond Okta. blog.xpnsec.com/identity-provi…


Harry Do Reposted

⚠️ Update for CVE-2024-21413 💣 Managed & confirmed Microsoft Outlook Remote Code Execution (RCE) but won't publish details (yet).


United States Trends
Loading...

Something went wrong.


Something went wrong.