@synbyte Profile picture

ThorMM

@synbyte

Penetration Tester / Cybersecurity Analyst

Joined July 2020
Similar User
NASH photo

@NisH0cK

Saint_I_Aint photo

@S41NTsec

Noodles photo

@udonandon

Lozr4 photo

@Lozr4_

ttc2mi photo

@ttc2mi

Uitwaaien photo

@Mrbekostips

Sarath Krish photo

@skn__07

D photo

@D__303

jake green photo

@Rando2217

0xh4ty photo

@0xh4ty

Suresh photo

@Suresh_3_6

ThorMM Reposted

🎤✨ Our security researcher, Konstantin Polishin, presented “Red Team Social Engineering 2024: Initial Access TTP and Project Experience of Our Team” at #ROOTCON18 🚀 Recording: youtube.com/watch?v=6nnZJi…

Tweet Image 1

ThorMM Reposted

I talk about this on the pod all the time, but CSRF is dead simple. You just need to know the conditions. I'm not gonna recite them again here, but today a new condition came up: No Content-Type header -> no CSRF restrictions Same-site: None POST = CSRF The research:


ThorMM Reposted

To summarize what I have learned about Mutation XSS, my CVE, and the solution to my challenge, I wrote a post going through it all. If you like regular XSS, this is a whole new world of crazy techniques and many sanitizer bypasses. You too can learn this! jorianwoltjer.com/blog/p/hacking…


ThorMM Reposted

I have put together a list of publicly known IOC for impacket. Thanks to @Octoberfest73 and others on the awesome research. n7wera.notion.site/Modifing-Impac…


ThorMM Reposted

Here's how you can quickly escalate your SQL injections to RCE on different databases! 🤑 A small thread! 🧵 👇


ThorMM Reposted

Types of #XSS Explained in a more "brutelogical" way.

Tweet Image 1

ThorMM Reposted

Just launched! Improve your GraphQL skills with my free Upskill Challenge! Takes around 30 minutes and will introduce you to writing queries and mutations, introspection and the differences between GraphQL and RESTful APIs justhacking.com/uc/uc-graphql/


ThorMM Reposted

🚀 AD Miner v1.7.0 release! This major update brings greatly improved cypher queries speed (thanks to GDS), brand-new ESC15 edge, a significant code refactoring, post-processing perfs boost, and more. For short, better and faster!🌟 github.com/Mazars-Tech/AD…

Tweet Image 1

ThorMM Reposted

🚨 100 Red Team Projects for Pentesters and Network Managers Here Link: github.com/kurogai/100-re…

Tweet Image 1

ThorMM Reposted

PSA to Red Teams: forking/cloning lsass.exe to get creds from the child is a gift to the blue team as it leaves a lsass child process + makes a trivial event log based detection. The following URL is timestamped to where I discussed this at @BSidesPhilly youtube.com/watch?v=Ow7Az1…


ThorMM Reposted

During my research for the video, I compiled the MXSS Evolution and Timeline, which is now public as blog. Awesome MXSS: github.com/msrkp/MXSS youtube.com/watch?v=aczTce…


ThorMM Reposted

MXSS Explained Part 1: Why Server-Side HTML Sanitizers Are Doomed to Fail with this XSS! In this video, I dive into how sanitizers work, discuss the first known MXSS in IE, and showcase an MXSS vulnerability in the popular Node.js module, sanitize-html. youtu.be/aczTceXp49U

Tweet Image 1

ThorMM Reposted

Ever wanted to quickly test for HTTP request smuggling vulnerabilities? 🧐 Smuggler by @defparam is an automated tool to help you find HTTP request smuggling and HTTP desync attacks! 😎 Smuggler is open-source and available on Github! 👇 buff.ly/37N4ouK

Tweet Image 1

ThorMM Reposted

For that need, I wrote a quick Python script that will bind to an interface and build subnets file based on incoming packets: gist.github.com/Dfte/9cfeb8789… was very useful lately 👀

Tweet Image 1

ThorMM Reposted

IOS Pentesting Series Learn how to work with useful tools and apps such as Frida, Objection, 3uTools, Cydia, Burp, fsmon, fridump, SSL bypass, reFlutter etc. Part 1: 🔗kishorbalan.medium.com/start-your-fir… Part 2: 🔗kishorbalan.medium.com/ios-pentesting… Part 3: 🔗kishorbalan.medium.com/ios-pentesting…


ThorMM Reposted

From a security standpoint, what would you do if you wanted to setup a new Active Directory installation today *and* wanted it to be at least decently secure? In answer, many fashionable IT/tech people would just give you just a laugh. But really, what would it take? A quick🧵:


ThorMM Reposted

Top JWT Attacks 😀 Thread 🧵:👇 Here is how to find JWT issues: 1) JWT or JSON web tokens are widely used these days for authorization purposes so it pays off to learn about what JWT’s entail and how we can abuse them. #BugBounty #bugbountytips #infosec


bro just discovered a hackbar variant that has some really old dios queries. And just casually injecting random dios queries and called it "... bypass many WAF's" Great content nevertheless for people who mostly use SQLMap for sql injection.

check out new video the extension i used for this video can Bypass many WAF's youtu.be/KgLKI2oPDtw?si…



Loading...

Something went wrong.


Something went wrong.