@tornikepa Profile picture

Tornike

@tornikepa

#Linux #Malware Researcher #Pent3ster published vulnerabilities #0day #Exploits advisories from various resources by #Cybersecurity #Bug #ReverseEngineering :wq

Joined December 2015
Similar User
Divyanshu Diwakar photo

@ddiwakr

Team Secure photo

@TeamSecureio

Neal Bridges photo

@ITJunkie

ege photo

@egeblc

magumison photo

@magumison

GeekyPanda photo

@geekypanda411

Bohan Zhang photo

@bohansec

f00fc7c800 photo

@f00fc7c800

Koichi photo

@x64koichi

Luigi Martire photo

@luigi_martire94

Cyber Villain 🛡️ photo

@VeryVillanous

MrM8BRH 🇵🇸 photo

@m8_brh

Charmarkeh Y. photo

@charmarkeh_ys

foxtrot.sol photo

@FoxtrotBugcrowd

Shivani Sharma photo

@shivanirsharma

Success! @testanull of @starlabs_sg was able to execute a 2-bug chain on Microsoft SharePoint. They earn $100,000 and 10 Master of Pwn points. #Pwn2Own #P2OVancouver

Tweet Image 1
Tweet Image 2


Using Fav-Up github.com/pielco11/fav-up is a simple and effective tool for identifying the real IP address of a server behind #Cloudflare. By using the #favicon associated with a web application as a starting point #search for the server's real IP address using #Shodan. #OSINT

Tweet Image 1

#Telegram data leak: 395 Million User allegedly put on sale online #DarkWeb Data expose the content messages it is worrying Telegram has yet to confirm the #dataleak, that the only evidence thus far consists of unsubstantiated screenshots posted to the dark web. #databreach

Tweet Image 1
Tweet Image 2
Tweet Image 3

Tornike Reposted

#Telegram leak votre username dans l'header TLS [Server_Name_Indication extension] Sympa non ? :)

Tweet Image 1

The #msdt Organisations may be able to defend themselves from attack, while they wait for an official patch from Microsoft, by tweaking their computers’ Registry keys to unregister the ms-msdt protocol. #0day #follina #microsoftoffice #malicious #security #infosec #vulnerability

Tweet Image 1
Tweet Image 2
Tweet Image 3

What is hidden in the number 68? Just a coincidence? #UkraineRussiaWar #Ukraine#war #History

Tweet Image 1

Check if your #Linux servers have been compromised. Scan them to detect traces of post-exploitation activity or #malicious code. Sign up for free at protect.intezer.com #Log4Shell #vulnerable app #POC used github.com/christophetd/l…

Tweet Image 1

run this in your Linux hosts to see where's your vuln code #Log4J #Log4Shell #vulnerability #intezer find / 2>/dev/null -regex ".*.jar" -type f | xargs -I{} grep JndiLookup.class "{}" Also open source tool to scan for #log4j usage in runtime github.com/intezer/log4js…


A security researcher has discovered a command injection #vulnerability that affects millions of Hikvision's #IoT devices, @MihirBagwe reports: #CVE-2021-36260 cyber.gov.au/acsc/view-all-…


Apple patches an XSS iCloud vulnerability after the bug was reported by a bug bounty hunter 9to5mac.com/2021/02/22/sec… #apple #icloud #xss #vulnerability #bug

Tweet Image 1

Tornike Reposted

A Threat Actor is selling a Database of the Italian mobile service provider ho. (ho-mobile.it) owned by @VodafoneIT 🇮🇹. The dump allegedly includes 2,500,000 customers' PII Data, Phone Numbers & ICCID that can be exploited for SIM swap attacks to empty Bank accounts.

Tweet Image 1

Data recovery engineers and digital forensics experts consider the #PC3000 #Flash as the #tool №1 #hardware #software #Data #Repair #Tool #SDCard #recovery #microchip #forensics


Problem with Windows? Reboot Problem with Linux? Be Root #Windows #Linux


%5B'-alert(document.cookie)-'%5D #XSS #Payloads #Attacks #Pentest


Loading...

Something went wrong.


Something went wrong.