@n3v1l1 Profile picture

n3v1l

@n3v1l1

Sólo un geek, amante de la tecnología, IoT, robótica, blockchain y por supuesto ciberseguridad

Similar User
Bsides Chile photo

@BSidesCL

NIVEL4 photo

@N4Security

8.8 RELOADED - 31/10 - CDMX - México photo

@8dot8

dplastico (pwn) photo

@dplastico

Fundación Educacional WhiloLab photo

@WhiloLab

xJhere photo

@jheeere

h4tt0r1 photo

@Hackttori

Vay3t photo

@vay3t

Sebastian Döll photo

@d0berm1n

Lockdown Fest photo

@Lockdown0x0

Iván González photo

@Gohanckz

Ivan Portillo photo

@ivanPorMor

Open-Sec photo

@OpenSec

n3v1l Reposted

This is a tool for searching Exploits from some Exploit Databases. Exploits are inserted at sqlite database(go-exploitdb) can be searched by command line interface. In server mode, a simple Web API can be used. github.com/vulsio/go-expl…


n3v1l Reposted

Hacking Contents - Reverse Engineering, Exploitation 📍 By: @0xor0ne Source: github.com/0xor0ne/awesom…


n3v1l Reposted

Windows doesn't verify the file extension if the file is executable, allowing malicious actors to spoof files and evade detection (PE files) A POC script for generating the payload more efficiently has been uploaded to: github.com/AnonKryptiQuz/…


n3v1l Reposted

The orginal RDPthief: github.com/0x09AL/RdpThief Now as a Powershell script made by The-Viper-One (not on X afaik): github.com/The-Viper-One/… Script loops checking for mstsc.exe. When it’s found it will inject RDPthief to capture cleartext credentials.

Tweet Image 1

n3v1l Reposted

A Python-based toolkit for Information Gathering and Reconnaissance Source: github.com/jasonxtn/Argus


n3v1l Reposted

It’s this cmd check if a folder is excluded: & "C:\Program Files\Windows Defender\MpCmdRun.exe" -Scan -ScanType 3 -File "C:\folder_to_check\|*" Tool can be found here github.com/Friends-Securi…

Just found a new, smarter way to reveal Defender exclusion paths using MpCmdRun.exe-way better than the old Event Log 5700 method. Always cool to level up the game! 🔥 You can check it out on our new blog, Friends & Security: blog.fndsec.net #CyberSecurity

Tweet Image 1


n3v1l Reposted

OpenSecurityTraining2 is a god tier FREE resource for reverse engineering, malware analysis, exploit dev, OS internals, and more. Full learning paths from x86-64 to Windows kernel internals. There are no words for how good OST2 is. 👇Link in comments.

Tweet Image 1

n3v1l Reposted

Deploy stealthy reverse shells using advanced process hollowing with GhostStrike – a C++ tool for ethical hacking and Red Team operations. github.com/stivenhacker/G…


n3v1l Reposted

Spider entire networks for juicy files sitting on SMB shares. Search filenames or file content - regex supported! github.com/blacklanternse…


n3v1l Reposted

always examine the .js files in the source code, for this I can recommend this simple but effective tool github.com/w9w/JSA from here you can access the endpoints of critical data, the places where backup files are stored and many endpoints 🌹🥰🥳 #bugbountytip #bugbounty

Tweet Image 1

n3v1l Reposted

🚀Just Released Bypass-Four03! 🎯 🛠️ It's a bash script to help bypass HTTP 403 errors using path & header fuzzing, HTTP method & protocol version testing, and more. Check it out on GitHub: [github.com/nazmul-ethi/By…] #bugbountytips #403Bypass

Tweet Image 1

Loading...

Something went wrong.


Something went wrong.