br5x (@br5xtr) 's Twitter Profile
br5x

@br5xtr

🇹🇷 Application Security | OSWE | OSCP | Bug Bounty

bugcrowd.com/br5x
yeswehack.com/hunters/br5x

ID: 1525011290825138176

calendar_today13-05-2022 07:14:22

130 Tweet

898 Followers

518 Following

TrentAU | 🇦🇺 Tarkov Emissary (@trentbraidner) 's Twitter Profile Photo

CrowdStrike Workaround steps from CrowdStrike Boot Windows into Safe Mode or the Windows Recovery Environment Navigate to the C:\Windows\System32\drivers\CrowdStrike directory Locate the file matching “C-00000291*.sys”, and delete it. Boot the host normally. #crowdstrike #BSOD

<a href="/CrowdStrike/">CrowdStrike</a> Workaround steps from <a href="/CrowdStrike/">CrowdStrike</a> 

Boot Windows into Safe Mode or the Windows Recovery Environment

Navigate to the C:\Windows\System32\drivers\CrowdStrike directory

Locate the file matching “C-00000291*.sys”, and delete it.

Boot the host normally.

#crowdstrike #BSOD
br5x (@br5xtr) 's Twitter Profile Photo

I've been taking a break from bug bounty for a long time. Guess what? I’m starting again next week! See you with amazing report results🤩

br5x (@br5xtr) 's Twitter Profile Photo

Remedy CTF looks amazing! I’m excited to get started as soon as possible. I look forward to seeing you all at the CTF. Huge thanks in advance to everyone who made this opportunity possible! Remedy