0xHacker (@0xhackerr) 's Twitter Profile
0xHacker

@0xhackerr

ID: 1815592335323086848

calendar_today23-07-2024 03:38:48

83 Tweet

12 Followers

443 Following

Two Seven One Three (@twosevenonet) 's Twitter Profile Photo

#malware If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔 #redteam #code

#malware
If you use a directory symlink path to create a process, Process Explorer will interpret the Path and Command Line of this process as the path containing the symlink, rather than the location of the executable file 🤔
#redteam #code
payloadartist (@payloadartist) 's Twitter Profile Photo

"Localhost tracking" - How Meta bypassed Android sandboxing to track users browsing other websites with Meta's embedded pixel. Fun fact: 22% of the most visited websites across the world embed Meta's pixel. zeropartydata.es/p/localhost-tr…

"Localhost tracking" - How Meta bypassed Android sandboxing to track users browsing other websites with Meta's embedded pixel.

Fun fact: 22% of the most visited websites across the world embed Meta's pixel. 

zeropartydata.es/p/localhost-tr…
Two Seven One Three (@twosevenonet) 's Twitter Profile Photo

#malware "clipup.exe" in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file github: /2x7EQ13/CreateProcessAsPPL #redteam #BlueTeam

#malware
"clipup.exe" in System32 is very powerful. It can destroy the executable file of the EDR service 😉. Experimenting with overwriting the MsMpEng.exe file
github: /2x7EQ13/CreateProcessAsPPL
#redteam #BlueTeam
sapir federovsky (@sapirxfed) 's Twitter Profile Photo

WOW!!! temp43487580.github.io/intune/bypass-… %TEMP% such a good post!!! it is so well written, interesting research and great results! Thank you! 🤩

Mike Takahashi (@taksec) 's Twitter Profile Photo

Google Dork - APIs Endpoints ⚙️ site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3 Find hidden APIs, try techniques 👨‍💻

Google Dork - APIs Endpoints ⚙️
site:example[.]com inurl:api | site:*/rest | site:*/v1 | site:*/v2 | site:*/v3

Find hidden APIs, try techniques 👨‍💻
VIEH Group (@viehgroup) 's Twitter Profile Photo

Google Dork - XSS Prone Parameters 🔥 site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:& Test for XSS in param value: '"><img src=x onerror=alert()> Credit: Mike Takahashi #infosec #bugbounty #bugbountytips

Google Dork - XSS Prone Parameters 🔥
site:example[.]com inurl:q= | inurl:s= | inurl:search= | inurl:query= | inurl:keyword= | inurl:lang= inurl:&amp;

Test for XSS in param value:
'"&gt;&lt;img src=x onerror=alert()&gt;

Credit: <a href="/TakSec/">Mike Takahashi</a> 

#infosec #bugbounty #bugbountytips
Aurélien Chalot (@defte_) 's Twitter Profile Photo

Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳

Dumping LSASS is old school. If an admin is connected on a server you are local admin on, just create a scheduled task asking for a certificate on his behalf, get the cert, get its privs. All automatized in the schtask_as module for NetExec 🥳🥳🥳
S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡 1) Create a clone into a new template of the target VM 2) Download the VMDK file of the template from the storage 3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY (1/3)

You got access to vsphere and want to compromise the Windows hosts running on that ESX? 💡

1) Create a clone into a new template of the target VM
2) Download the VMDK file of the template from the storage
3) Parse it with Volumiser, extract SAM/SYSTEM/SECURITY 
(1/3)
Mike Takahashi (@taksec) 's Twitter Profile Photo

Google Dork - Code Leaks 🔑 site:pastebin. com "example. com" site:jsfiddle. net "example. com" site:codebeautify. org "example. com" site:codepen. io "example. com" Check for code snippets, secrets, configs 👀

Google Dork - Code Leaks 🔑

site:pastebin. com "example. com"
site:jsfiddle. net "example. com"
site:codebeautify. org "example. com"
site:codepen. io "example. com"

Check for code snippets, secrets, configs 👀
Rudy Ooms | MVP 🇳🇱 (@mister_mdm) 's Twitter Profile Photo

Administrator Protection in Windows 25H2 Changes Everything With update KB5067036, Windows quietly introduced Administrator Protection, and it changes how Windows handles admin rights. Until now, being a local admin meant living like Clark Kent: doing normal tasks in plain

Administrator Protection in Windows 25H2 Changes Everything

With update KB5067036, Windows quietly introduced Administrator Protection, and it changes how Windows handles admin rights.

Until now, being a local admin meant living like Clark Kent: doing normal tasks in plain
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

The flaw allows attackers to gain SYSTEM privileges on Windows Server 2025 via a new NTLM relay attack that bypasses LDAP Channel Binding. PoC available! #WindowsServer #InfoSec #CVE #NTLM #CyberSecurity securityonline.info/poc-exploit-re…

Smukx.E (@5mukx) 's Twitter Profile Photo

Bypassing PPL in Userland TLDR: bypass the latest mitigation implemented by Microsoft and develop a new Userland exploit for injecting arbitrary code in a PPL with the highest signer type. itm4n.github.io/bypassing-ppl-…

Bypassing PPL in Userland

TLDR:  bypass the latest mitigation implemented by Microsoft and develop a new Userland exploit for injecting arbitrary code in a PPL with the highest signer type.

itm4n.github.io/bypassing-ppl-…
ZoomEye (@zoomeye_team) 's Twitter Profile Photo

🔥 ZoomEye Black Friday – LIFETIME Deals 🔥 ⏰ Nov 27, 10:00 HKT – Limited Stock 💥 Lifetime Plans - One payment, access forever! 1. Membership — $149 Access to all standard features. Perfect for Pentesters & Researchers. 2. Membership Pro — $999 Includes everything in

🔥 ZoomEye Black Friday – LIFETIME Deals 🔥
⏰ Nov 27, 10:00 HKT – Limited Stock

💥 Lifetime Plans - One payment, access forever!
1. Membership — $149
Access to all standard features. Perfect for Pentesters &amp; Researchers.
2. Membership Pro — $999
Includes everything in
blackorbird (@blackorbird) 's Twitter Profile Photo

A new evasion technique known as "EDR-Freeze" has emerged, changing the way attackers neutralize endpoint security. Unlike traditional methods that attempt to crash or terminate security software (which often triggers alerts), EDR-Freeze suspends the security process entirely,

A new evasion technique known as "EDR-Freeze" has emerged, changing the way attackers neutralize endpoint security. Unlike traditional methods that attempt to crash or terminate security software (which often triggers alerts), EDR-Freeze suspends the security process entirely,