#0x5952 (@0x4161) 's Twitter Profile
#0x5952

@0x4161

Network Pentester | #eWPTv2 | #eJPTv2 | Preparing for #eCPPTv3 & #CRTA

ID: 1816229957044953088

linkhttps://0x4161.github.io calendar_today24-07-2024 21:52:30

397 Tweet

1,1K Takipçi

315 Takip Edilen

OS Dev (@osdev_) 's Twitter Profile Photo

Read “Windows Internals: Thread Management — Part 1“ by OS Dev on Medium: This article discusses about ETHREAD, KTHREAD kernel objects & windows scheduler - how it schedules a thread. medium.com/windows-os-int…

ö (@r0keb) 's Twitter Profile Photo

Good morning! Just published a blog post diving into Windows Kernel Pool internals: basics, memory allocation functions, internal structures, and how Segment Heap, LFH, and VS work. r0keb.github.io/posts/Windows-…

ΓελρεгЖ (@datareaper3319) 's Twitter Profile Photo

Return Oriented Programming (ROP) Explanation Return Oriented Programming (ROP) is an advanced exploitation technique used to bypass non executable stack protections (NX/DEP). Instead of injecting new code, ROP chains together existing code snippets (“gadgets”) ending in ret

Return Oriented Programming (ROP) Explanation

Return Oriented Programming (ROP) is an advanced exploitation technique used to bypass non executable stack protections (NX/DEP). Instead of injecting new code, ROP chains together existing code snippets (“gadgets”) ending in ret
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

📢 Lateral Movement via BitLocker 📖 1x Playbook 🏹 4x Threat Hunting Queries ⚙️ 2x SIGMA Rules #purpleteam #iPurpleTeam #sigma #detectionengineering #threathunting ipurple.team/2025/08/04/lat…

Caesar (@bigdontea) 's Twitter Profile Photo

Hello, i wrote a blog on one of the modern persistence techniques in Linux using the unshare syscall. Enjoy reading hackmd.io/@0xmadvise/rJP…

Rakan Allhyani 🇸🇦 (@who_ami77) 's Twitter Profile Photo

كيف قدرت اكتشف ثغرتين حرجة في احد الشركات 🔴 بالبداية لازم نفهم logic الموقع كيف يشتغل, الموقع كان يعمل على الGraphQL طيب راكان وش هي الGraphql اصلا ؟ هي بكل بساطة لغة استعلام الغرض الاساسي منه هو يسمح للclient يطلب بالضبط البيانات اللي يحتاجها

Marci Ujlaki (@ujlakimarci) 's Twitter Profile Photo

Yet another max score vuln 🥹 🟥 CVE-2025-20265, CVSS: 10.0 (#Critical, #Highest) Cisco Secure Firewall Management Center (FMC) Software A critical vulnerability in the RADIUS subsystem. Unauthenticated remote attackers can inject arbitrary shell commands due to improper user

Yet another max score vuln 🥹

🟥 CVE-2025-20265, CVSS: 10.0 (#Critical, #Highest)

Cisco Secure Firewall Management Center (FMC) Software

A critical vulnerability in the RADIUS subsystem.

Unauthenticated remote attackers can inject arbitrary shell commands due to improper user
#0x5952 (@0x4161) 's Twitter Profile Photo

⭕️ CTF : المستوى - متوسط الرابط - http://148.230.118.230:5000 نوعه - Web الهدف انك توصل ل ملف Flag.txt/ (((ما يحتاج Fuzzing ))) بس يحتاج تفسر و تستنتج نوعا ما

⭕️ CTF :

المستوى - متوسط
الرابط - http://148.230.118.230:5000
نوعه - Web

الهدف انك توصل ل ملف Flag.txt/
(((ما يحتاج Fuzzing )))
بس يحتاج تفسر و تستنتج نوعا ما
John Hammond (@_johnhammond) 's Twitter Profile Photo

The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potential for Bloodhound to not just map attack paths within Microsoft Active Directory or Entra ID tenants, but now... ANYTHING 🤩 youtu.be/kVOjXGbm_Ro

The new Bloodhound version has some genuinely crazy cool new features -- OpenGraph really blows the doors off the potential for Bloodhound to not just map attack paths within Microsoft Active Directory or Entra ID tenants, but now... ANYTHING 🤩 youtu.be/kVOjXGbm_Ro
itto (@xo_itto) 's Twitter Profile Photo

نزلت التحدي النوع : web الرابط : 91426f1ef2c9.ngrok-free.app Let’s see who gets First Blood! شاركوني ارائكم بالتحدي👍🏻 #CTF #BugBounty #cybersecuritytips