Luis Vacas de Santos (@cybervaca_) 's Twitter Profile
Luis Vacas de Santos

@cybervaca_

Cybersecurity Analyst, Evil-WinRM Creator

ID: 961534720898191361

linkhttps://www.hackthebox.eu/profile/6956 calendar_today08-02-2018 09:38:36

1,1K Tweet

1,1K Followers

653 Following

X (@themsterdoctor1) 's Twitter Profile Photo

🧠💥 99% of hackers QUIT when they see a 403… But the 1%? They try this: 👇 I found a 403 Forbidden on /admin. But then I tried: •POST /admin •X-Original-URL: /admin •/admin..;/ •%2e/admin •X-Rewrite-URL: /admin •/ADMIN (yes, just caps) •/;/admin •/..;/admin 👇👇👇

🧠💥 99% of hackers QUIT when they see a 403…

But the 1%? They try this: 👇

I found a 403 Forbidden on /admin.

But then I tried:
•POST /admin
•X-Original-URL: /admin
•/admin..;/
•%2e/admin
•X-Rewrite-URL: /admin
•/ADMIN (yes, just caps)
•/;/admin
•/..;/admin

👇👇👇
Sec/Admln Cybersecurity Conference (@secadm1n) 's Twitter Profile Photo

🚨 ¡Ya están aquí! Las entradas para #secadmin2025 ya están a la venta en nuestro sitio web 👉 secadmin.es ⏰ Precio actual de las entradas limitado. ⚠️ Se agotan rápido… ¡Corre por la tuya!

🚨 ¡Ya están aquí!
Las entradas para #secadmin2025 ya están a la venta en nuestro sitio web 👉 secadmin.es 
⏰ Precio actual de las entradas limitado.
⚠️ Se agotan rápido… ¡Corre por la tuya!
NullSecX (@nullsecurityx) 's Twitter Profile Photo

How to recon like 👇 Find subs > assetfinder Find alive hosts > httprobe Fetch paths for hosts > meg Check this out 👇 #BugBounty

Sec/Admln Cybersecurity Conference (@secadm1n) 's Twitter Profile Photo

🎟️ ¡Entradas ya a la venta! Vuelve SecAdmin, el evento de referencia en #ciberseguridad. 📅 28 y 29 de noviembre 2025. Aprende, conecta y prepárate para los desafíos de la seguridad digital. 🎫 Compra tu entrada hoy 👉 secadmin.es/tienda-secadmi…

🎟️ ¡Entradas ya a la venta!
Vuelve SecAdmin, el evento de referencia en #ciberseguridad.
📅 28 y 29 de noviembre 2025.
Aprende, conecta y prepárate para los desafíos de la seguridad digital.
🎫 Compra tu entrada hoy 👉 secadmin.es/tienda-secadmi…
Synacktiv (@synacktiv) 's Twitter Profile Photo

Ever thought your kitchen appliance could harbor a persistent threat? We reverse-engineered the Thermomix TM5 and uncovered vulnerabilities allowing arbitrary code execution, persistence, and secure boot bypass. Discover our step-by-step breakdown! synacktiv.com/en/publication…

Bitup Alicante Ciberseguridad (@bitupalicante) 's Twitter Profile Photo

OJO!! porque... ¡VUELVE la #BitUP25 el 8 de noviembre!!! Reservad ese día, porque este año volvemos siendo más y con muchas ganas de volver a liarla! Desde hoy ya están abiertos el #CallforPapers y #CallforSponsors! bitupalicante.com #ciberseguridad #CyberSecurity

OJO!! porque... ¡VUELVE la #BitUP25 el 8 de noviembre!!!
Reservad ese día, porque este año volvemos siendo más y con muchas ganas de volver a liarla!

Desde hoy ya están abiertos el #CallforPapers y #CallforSponsors! 

bitupalicante.com

#ciberseguridad #CyberSecurity
elhacker.NET (@elhackernet) 's Twitter Profile Photo

🚨 Vulnerabilidad crítica de inyección SQL en FortiWeb de Fortunet ⚠️ CVE-2025-25257 Gravedad CVSS 9.6 fortiguard.fortinet.com/psirt/FG-IR-25…

🚨 Vulnerabilidad crítica de inyección SQL en FortiWeb de Fortunet 

⚠️ CVE-2025-25257
Gravedad CVSS  9.6
fortiguard.fortinet.com/psirt/FG-IR-25…
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

HExHTTP: A tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors GitHub: github.com/c0dejump/HExHT…

HExHTTP: A tool designed to perform tests on HTTP headers and analyze the results to identify vulnerabilities and interesting behaviors

GitHub: github.com/c0dejump/HExHT…
IT Guy (@t3chfalcon) 's Twitter Profile Photo

Hit Recent Files. You don’t need to guess what they opened. Windows logs it for you: C:\Users\%USERNAME%\AppData\Roaming\Microsoft\Windows\Recent You can find: – Internal docs – Secret presentations – Vault exports – "DO NOT SHARE" PDFs You're welcome 👊🏾

N$ (@nav1n0x) 's Twitter Profile Photo

🚨 New Write-up - I recently found another interesting SQLi - this time in a cookie banner. It escalated to full RCE on a live target via PostgreSQL injection. Here’s the article on how the magic of simple recon turned into critical impact: nav1n.medium.com/from-cookie-co… #bugbounty

IT Guy (@t3chfalcon) 's Twitter Profile Photo

Think your browser autofill is harmless? Check this file: %LocalAppData%/Microsoft/Edge/User Data/Default/Web Data Inside: – Emails – Names – Company info – Sometimes card details Stored in plain SQLite. For red teamers? Easy recon. For users? Big Privacy risk.

Think your browser autofill is harmless?

Check this file:

%LocalAppData%/Microsoft/Edge/User Data/Default/Web Data

Inside:
– Emails
– Names
– Company info
– Sometimes card details

Stored in plain SQLite.

For red teamers? Easy recon.
For users? Big Privacy risk.
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

A lightweight tool that injects a custom assembly proxy into a target process to silently bypass ETW scanning by redirecting ETW calls to custom proxy github.com/EvilBytecode/E…

Hex-Rays SA (@hexrayssa) 's Twitter Profile Photo

📢 Calling all #CTF (Capture the Flag) Organizers and Competitors! Hex-Rays is now accepting applications for our Sponsorship Program—and we want to hear from you. Perks include FREE #IDA licenses, exclusive swag, and travel support. For more info, visit: eu1.hubs.ly/H0lZbN20

📢 Calling all #CTF (Capture the Flag) Organizers and Competitors! Hex-Rays is now accepting applications for our Sponsorship Program—and we want to hear from you.

Perks include FREE #IDA licenses, exclusive swag, and travel support. For more info, visit: eu1.hubs.ly/H0lZbN20
Jose Luis Verdeguer (@pepeluxx) 's Twitter Profile Photo

Rtpengine RTP Injection and Media Bleed Vulnerabilities (CVE-2025-53399) enablesecurity.com/blog/rtpengine… Sandro Gauci is the same problem described in rtpbleed.com ?

Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨 :CVE-2025-54253(CVSS 10.0): Misconfiguration Allowing Arbitrary Code Execution. CVE-2025-54254:Improper Restriction of XML External Entity Reference (XXE) Allowing Arbitrary File System Read. 🧐Deep Dive : slcyber.io/assetnote-secu… 📊11.6K Services are found on the

🚨Alert🚨 :CVE-2025-54253(CVSS 10.0): Misconfiguration Allowing Arbitrary Code Execution.
CVE-2025-54254:Improper Restriction of XML External Entity Reference (XXE) Allowing Arbitrary File System Read.
🧐Deep Dive : slcyber.io/assetnote-secu…
📊11.6K Services are found on the
Alex Neff (@al3x_n3ff) 's Twitter Profile Photo

Session enumeration is only possible with admin privileges? That is a problem of the past thanks to the new --reg-sessions core functionality of NetExec, made by Toffy🔥

Session enumeration is only possible with admin privileges? That is a problem of the past thanks to the new --reg-sessions core functionality of NetExec, made by <a href="/toffyrak/">Toffy</a>🔥
Peter Gabaldon (@pedrogabaldon) 's Twitter Profile Photo

I've just added a new PR to impacket to add to secretsdump the "Shadow Snapshot Method via WMI" also for NTDS.dit. This way, NTDS.dit can be downloaded directly from disk without code execution. github.com/fortra/impacke…

🕳 (@sekurlsa_pw) 's Twitter Profile Photo

Reading Impacket merges: BadSuccessor is now in examples. GetST now has -dmsa github.com/fortra/impacke… github.com/fortra/impacke… Secretsdump also got a patch to not crash w2019 DCs. NetExec removed the warning that --ntds can crash 2019.

Reading Impacket merges:

BadSuccessor is now in examples. GetST now has -dmsa
github.com/fortra/impacke…
github.com/fortra/impacke…

Secretsdump also got a patch to not crash w2019 DCs. NetExec removed the warning that --ntds can crash 2019.