OᎢ π‚π–—π–†π–ˆπ€ (@0gcrack) 's Twitter Profile
OᎢ π‚π–—π–†π–ˆπ€

@0gcrack

Original Com Kid

ID: 1965412240229556224

linkhttps://breachsta.rs/ calendar_today09-09-2025 13:49:44

4 Tweet

1 Followers

114 Following

vx-underground (@vxunderground) 's Twitter Profile Photo

If people keep pushing AI vibe coded slop imagine how much money us cybersecurity nerds are gonna make Chat, it's going to be a very prosperous couple of decades

If people keep pushing AI vibe coded slop imagine how much money us cybersecurity nerds are gonna make

Chat, it's going to be a very prosperous couple of decades
_leon_jacobs(πŸ’₯) (@leonjza) 's Twitter Profile Photo

I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)

I've been hacking on a new Windows Named Pipe tool called PipeTap which helps analyse named pipe communications. Born out of necessity while doing some vulnerability research on a target, its been super useful in reversing it's fairly complex protocol. :)
OᎢ π‚π–—π–†π–ˆπ€ (@0gcrack) 's Twitter Profile Photo

SpearSpray Advanced password spraying tool for AD environments. Combines LDAP user enumeration with intelligent pattern-based password generation. Uses Kerberos pre-authentication and leverages user-specific data to create personalized pwds per user. github.com/sikumy/spearsp…

OᎢ π‚π–—π–†π–ˆπ€ (@0gcrack) 's Twitter Profile Photo

A utility for running processes with Protected Process Light (PPL) protection, enabling bypass of EDR/AV. Leverages legitimate Windows clipup.exe functionality from System32 to create protected processes that can overwrite AV service executable files. github.com/2x7EQ13/Create…

Winston Ighodaro (@officialwhyte22) 's Twitter Profile Photo

I bypassed a Web Application Firewall by encoding all my payloads with hex values. While normal requests were blocked, my encoded commands were executed server-side. This trick gave me access to restricted endpoints and sensitive credentials.

I bypassed a Web Application Firewall by encoding all my payloads with hex values. While normal requests were blocked, my encoded commands were executed server-side. This trick gave me access to restricted endpoints and sensitive credentials.
OᎢ π‚π–—π–†π–ˆπ€ (@0gcrack) 's Twitter Profile Photo

WSASS This is a tool that uses the old WerfaultSecure.exe program to dump the memory of processes protected by PPL (Protected Process Light), such as LSASS.EXE. The output is in Windows MINIDUMP format. github.com/2x7EQ13/WSASS