🔥 Fire Hunter 🔥 (@fireh7nter) 's Twitter Profile
🔥 Fire Hunter 🔥

@fireh7nter

Enthusiastic about #infosec #security #offensive
Cyber Security Consultant at @niiconsulting

Tweets are my own

ID: 1078598905

linkhttps://fireh7nter.com/ calendar_today11-01-2013 05:33:28

3,3K Tweet

314 Followers

1,1K Following

MalwareLab (@malwarelab_eu) 's Twitter Profile Photo

My write-up for the Kaspersky challenge from Ekoparty | Hacking everything #CTF is online. This was very nice challenge - #network traffic analysis, exploitation, #malware, #reverseengineering and #crypto malwarelab.eu/posts/ekoparty… #EKOPARTYCTF #networksecurity #malwareanalysis #cyberchef

My write-up for the <a href="/kaspersky/">Kaspersky</a> challenge from <a href="/ekoparty/">Ekoparty | Hacking everything</a> #CTF is online. This was very nice challenge - #network traffic analysis, exploitation, #malware, #reverseengineering and #crypto

malwarelab.eu/posts/ekoparty…

#EKOPARTYCTF #networksecurity #malwareanalysis #cyberchef
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

Toyota confirms breach after Medusa ransomware threatens to leak data - Bill Toulas bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

0xor0ne (@0xor0ne) 's Twitter Profile Photo

For anyone interested in learning Windows binary reverse engineering, these are excellent resources by Alexandre Borges (Alexandre Borges) Article 01: exploitreversing.files.wordpress.com/2023/04/exploi… Article 02: exploitreversing.files.wordpress.com/2024/01/exploi… #infosec #windows

For anyone interested in learning Windows binary reverse engineering, these are excellent resources by Alexandre Borges (<a href="/ale_sp_brazil/">Alexandre Borges</a>)

Article 01: exploitreversing.files.wordpress.com/2023/04/exploi…
Article 02: exploitreversing.files.wordpress.com/2024/01/exploi…

#infosec #windows
Network Intelligence (@niiconsulting) 's Twitter Profile Photo

We're thrilled to announce that KK Mookhey, CEO & Founder at Network Intelligence, has been recognized as one of the top 100 influencers in cybersecurity with the prestigious CF 100 award! #Leadership #CF100Influencers #NetworkIntelligence (1/2)

We're thrilled to announce that KK Mookhey, CEO &amp; Founder at Network Intelligence, has been recognized as one of the top 100 influencers in cybersecurity with the prestigious CF 100 award!

#Leadership #CF100Influencers #NetworkIntelligence

(1/2)
Network Intelligence (@niiconsulting) 's Twitter Profile Photo

Unleash your potential at Network Intelligence! We're seeking exceptional talent to fuel our growth. #NetworkIntelligence #hiring #cybersecurityjobs (1/3)

Unleash your potential at Network Intelligence!
We're seeking exceptional talent to fuel our growth.

#NetworkIntelligence #hiring #cybersecurityjobs 

(1/3)
Smukx.E (@5mukx) 's Twitter Profile Photo

Some low level blogs: A Beginner's Guide to Windows Shellcode Execution Techniques: csandker.io/2019/07/24/ABe… Windows shellcode development Part 1,2: securitycafe.ro/2015/10/30/int… securitycafe.ro/2015/12/14/int… inMemoryShellcode techniques: github.com/csandker/inMem… A novel approach to

Some low level blogs: 

A Beginner's Guide to Windows Shellcode Execution Techniques:
csandker.io/2019/07/24/ABe…

Windows shellcode development Part 1,2: 
securitycafe.ro/2015/10/30/int…

securitycafe.ro/2015/12/14/int…

inMemoryShellcode techniques: 
github.com/csandker/inMem…

A novel approach to
PentesterLab (@pentesterlab) 's Twitter Profile Photo

Research to read this week: 💎 nastystereo.com/security/rails… 🍊 worst.fit/assets/EU-24-T… 🌨️ y4nush.com/posts/when-rep… 🔍 yaniv-git.github.io/2024/12/08/DOM…

Brut 🇮🇳 (@wtf_brut) 's Twitter Profile Photo

🚨Android SSL Pinning Bypass using Noxer🚨 👉Automate your Android penetration testing lab setup using Nox Emulator. Noxer is a powerful Python script designed for automating Android penetration testing tasks within the Nox Player emulator. It simplifies setup, enhances

b33f | 🇺🇦✊ (@fuzzysec) 's Twitter Profile Photo

I have posted the slides for the talk chompie and I gave this past weekend at H2HC -> The Kernel Hacker’s Guide to the Galaxy: Automating Exploit Engineering Workflows #H2HC github.com/FuzzySecurity/…

I have posted the slides for the talk <a href="/chompie1337/">chompie</a> and I gave this past weekend at <a href="/h2hconference/">H2HC</a> -&gt; The Kernel Hacker’s Guide to the Galaxy: Automating Exploit Engineering Workflows #H2HC

github.com/FuzzySecurity/…
Smukx.E (@5mukx) 's Twitter Profile Photo

Complete Guide to Install Game of Active Directory on Proxmox: * mayfly277.github.io/posts/GOAD-on-… * mayfly277.github.io/posts/GOAD-on-… * mayfly277.github.io/posts/GOAD-on-… * mayfly277.github.io/posts/GOAD-on-… * mayfly277.github.io/posts/GOAD-on-…

Complete Guide to Install Game of Active Directory on Proxmox: 
* mayfly277.github.io/posts/GOAD-on-…

* mayfly277.github.io/posts/GOAD-on-…

* mayfly277.github.io/posts/GOAD-on-…

* mayfly277.github.io/posts/GOAD-on-…

* mayfly277.github.io/posts/GOAD-on-…
cts🌸 (@gf_256) 's Twitter Profile Photo

This new Project Zero blog post is sick. It offers a glimpse into how folks do UAF in the "real world". (i.e. in the wild) You have to be smart about what to spray, etc. especially when you don't have a leak

This new Project Zero blog post is sick. It offers a glimpse into how folks do UAF in the "real world". (i.e. in the wild)
You have to be smart about what to spray, etc. especially when you don't have a leak
Danielle Aminov (@aminovdanielle) 's Twitter Profile Photo

I was looking into how organizations deploy Spring Boot Actuator in the cloud and found 1 in 4 exposed Actuators had security flaws leading to data leaks or RCE. These risks are more common than you'd think..⚠️

I was looking into how organizations deploy Spring Boot Actuator in the cloud and found 1 in 4 exposed Actuators had security flaws leading to data leaks or RCE. These risks are more common than you'd think..⚠️
Security Trybe (@securitytrybe) 's Twitter Profile Photo

Top 8 cyberattacks and the basis of how they’re launched: they exploit trust, unpatched flaws, exposed services, or supply chains — then escalate to steal, disrupt, or extort.

Top 8 cyberattacks and the basis of how they’re launched:

 they exploit trust, unpatched flaws, exposed services, or supply chains — then escalate to steal, disrupt, or extort.
Clandestine (@akaclandestine) 's Twitter Profile Photo

𝗘𝗫𝗣𝗟𝗢𝗜𝗧 𝗗𝗘𝗩𝗘𝗟𝗢𝗣𝗠𝗘𝗡𝗧 🐌 🔗 Part 1 : Intro :- 0xninjacyclone.github.io/posts/exploitd… 🔗 Part 2 : Understanding Stack Memory :- 0xninjacyclone.github.io/posts/exploitd… 🔗 Part 3 : Understanding Heap Memory :- 0xninjacyclone.github.io/posts/exploitd… 🔗 Part 4 : Understanding Binary Files :-

Gameel Ali 🤘 (@malgamy12) 's Twitter Profile Photo

Our first Lab about #Kimsuky APT campaign. 🧪 Operation Silent Serpent (7-stage chain lab) 🔗 malops.io/chain-challeng… Each stage unlocks the next just like real-world investigations. 💬 Discord: discord.gg/k8zTFhQg 👤 Creator: linkedin.com/in/abish-g

Our first Lab about #Kimsuky APT campaign.

🧪 Operation Silent Serpent (7-stage chain lab)
🔗 malops.io/chain-challeng…
Each stage unlocks the next  just like real-world investigations.

💬 Discord: discord.gg/k8zTFhQg
👤 Creator: linkedin.com/in/abish-g