Rizwan Syed (@_r12w4n) 's Twitter Profile
Rizwan Syed

@_r12w4n

Cyber Security Enthusiast
#InfoSec

ID: 3067822454

linkhttp://haxbabatech.blogspot.com calendar_today08-03-2015 07:58:05

131 Tweet

131 Takipçi

1,1K Takip Edilen

AMol NAik (@amolnaik4) 's Twitter Profile Photo

Last week, I was supposed to deliver a talk. Because of personal emergency, I could not. Here are things I wanted to communicate. 5 things every startup should do to avoid data breach A thread. #startup #security #securitybreach

Ellis Springe (@knavesec) 's Twitter Profile Photo

CredMaster 2.0 passspray tool release! New features like notification alerts, advanced SOC evasion techniques, 8 new plugins and an easy config file. S/O to Andy Gill for all his contributions in the rewrite B: whynotsecurity.com/blog/credmaste… G: github.com/knavesec/CredM…

CredMaster 2.0 passspray tool release! New features like notification alerts, advanced SOC evasion techniques, 8 new plugins and an easy config file. S/O to <a href="/ZephrFish/">Andy Gill</a> for all his contributions in the rewrite
B: whynotsecurity.com/blog/credmaste…
G: github.com/knavesec/CredM…
Rizwan Syed (@_r12w4n) 's Twitter Profile Photo

I recently gave a talk on "Automating Reconnaissance Workflows for Effective Penetration Testing" at the Null Mumbai. It was a wonderful experience to share my insights and knowledge with such an enthusiastic audience. Thank you to the Null Community for…lnkd.in/dwM7B7ez

meg west (@cybersecmeg) 's Twitter Profile Photo

if hiring managers and HR started to realize that they should be hiring new cybersecurity talent based upon someone’s potential instead of solely examining their past, we wouldn’t have a near 3 million person shortage in the field

rootsecdev (@rootsecdev) 's Twitter Profile Photo

Last night I had reservations on tweeting this until the GitHub repo was pulled. It contained a binary that would drop onto a system and start exfiltration of info such as private ssh keys. As some newer exploits go public, code should always be reviewed especially from non

Last night I had reservations on tweeting this until the GitHub repo was pulled. It contained a binary that would drop onto a system and start exfiltration of info such as private ssh keys. 

As some newer exploits go public, code should always be reviewed especially from non
HADESS (@hadess_security) 's Twitter Profile Photo

Top 50 Techniques & Procedures(RTC0019) Collection: redteamrecipe.com/top-50-ttps/ url > .zip > .js > .dll url > .zip > .lnk > curl > .dll ... HTML Smuggling -> Msiexec - .msi stager -> Rundll32 - .dll loader #redteam #redteamrecipe #mitre #offensivesecurity #privilegeescalation #ttps

Top 50 Techniques &amp; Procedures(RTC0019)
Collection: redteamrecipe.com/top-50-ttps/

url &gt; .zip &gt; .js &gt; .dll
url &gt; .zip &gt; .lnk &gt; curl &gt; .dll
...
HTML Smuggling -&gt; Msiexec - .msi stager -&gt; Rundll32 - .dll loader

#redteam #redteamrecipe #mitre #offensivesecurity #privilegeescalation #ttps
X-C3LL (@thexc3ll) 's Twitter Profile Photo

Since one of the bugs has been fixed, it's time to confess: I've been tracking and pwning Red Teams and script kiddies using EvilNoVNC and similar shit based on NoVNC and "Browser in Browser".

Chirag Savla (@chiragsavla94) 's Twitter Profile Photo

Dive into the depths of Function Apps package files and Storage Account permission abuse with me and Raunak Parmar in our latest blog post: 3xpl01tc0d3r.blogspot.com/2023/10/explor… #AzureCloud #FunctionApps #StorageAccount #redteam #Pentesting

Florian Roth ⚡️ (@cyb3rops) 's Twitter Profile Photo

I love this brave new world where a single leaked or stolen token can significantly impact cloud service providers, their customers, and even their customers' clients #Okta #TokenBinding #DuckingTokens

I love this brave new world where a single leaked or stolen token can significantly impact cloud service providers, their customers, and even their customers' clients

#Okta #TokenBinding #DuckingTokens
Paul Seekamp (@nullenc0de) 's Twitter Profile Photo

Auditor: So do you vulnerability scan your *checks notes* seven /16s networks on a monthly basis? Customer: nightly basis Auditor: *writes down "daily" on form* Me: *don't say anything* ... At the speed of light? Are you scanning your internal network at the speed of light?

FOSS United | Mumbai (@mumbaifoss) 's Twitter Profile Photo

Exciting lineup of speakers! Join us this month for another exciting FOSS Meetup in Mumbai! 🚀 Embrace the spirit of collaboration and knowledge sharing. See you there! #FOSSMumbai #FOSSMeetupMumbai #UnitedbyFOSS #MeetupJanuary2024

Exciting lineup of speakers!

Join us this month for another exciting FOSS Meetup in Mumbai! 🚀 Embrace the spirit of collaboration and knowledge sharing. See you there! #FOSSMumbai #FOSSMeetupMumbai #UnitedbyFOSS #MeetupJanuary2024
assume_breach (@assume_breach) 's Twitter Profile Photo

I wrote this to try to bring some reality to people trying to break into cyber. People will disagree with some (all) of it but hopefully somebody benefits from what I saw when I worked as a pentester. assume-breach.medium.com/im-not-a-pente…

Gunnar Andrews (@g0lden_infosec) 's Twitter Profile Photo

This is the type of stuff that makes current AND future creators tentative to share their tools, videos, content, etc. This is extremely disheartening to see coming out of our community tbh. youtu.be/ZAh21hHJC_s?si…

Rizwan Syed (@_r12w4n) 's Twitter Profile Photo

MindMap Attack Surface Tools Resources v1.2 speakerdeck.com/r12w4n/mindmap… #recon #bugbountytip #redteam #cyberSec #osint #AppSec #NetSec #BugBounty #AttackSurface #Pentesting

Sean Metcalf (@pyrotek3) 's Twitter Profile Photo

If you have VMware ESXi and Active Directory in your environment, take 5 minutes now & create a group in each AD domain called "ESX Admins". Make sure that the "ESX Admins" group is in a top-level administrative OU that only your AD admins manage. #QuickFix