0xbugatti (@0xbugatti) 's Twitter Profile
0xbugatti

@0xbugatti

AMSI|ShellCode|Kerberos Fucker|
Blog:👉 redme.gitbook.io/redme/

RedTeamer Works in IR

ID: 1563984945940398080

calendar_today28-08-2022 20:20:56

32 Tweet

259 Takipçi

281 Takip Edilen

0xbugatti (@0xbugatti) 's Twitter Profile Photo

Hey Gus 👋 Do you want to know what's the Assembly Reflection in .Net 🤔 Please check this code Basics through C# github.com/0xBugatti/Basi… Basics through Powershell Projects github.com/0xBugatti/MalD… Reflection Usage -Damage AMSI -In-Memory PE Execution -evade RunTime calling😎

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

After holding the talks at /ˈziːf-kɒn/ and TROOPERS Conference done, I also finally managed to write down my latest research about userland hook evasion: s3cur3th1ssh1t.github.io/Cat_Mouse_or_C…

After holding the talks at <a href="/x33fcon/">/ˈziːf-kɒn/</a>
 and <a href="/WEareTROOPERS/">TROOPERS Conference</a>
 done, I also finally managed to write down my latest research about userland hook evasion:

s3cur3th1ssh1t.github.io/Cat_Mouse_or_C…
GiamMa-based researchers SDR R&D IoT (@giammaiot2) 's Twitter Profile Photo

flipperscope by anfractuosity github.com/anfractuosity/… Attempt at an oscilloscope application for the flipper zero. Provide signal to pin 16/PC0, with a voltage ranging from 0V to 2.5V & ground to pin 18/GND. #DSP #FlipperZero

flipperscope by anfractuosity

github.com/anfractuosity/…

Attempt at an oscilloscope application for the flipper zero.
Provide signal to pin 16/PC0, with a voltage ranging from 0V to 2.5V &amp; ground to pin 18/GND.

#DSP
#FlipperZero
0xbugatti (@0xbugatti) 's Twitter Profile Photo

Hi there All my work will be available on Kindly check all the sections and review them then feel free to give me any feedback Thanks 0xbugatti.gitbook.io

0xbugatti (@0xbugatti) 's Twitter Profile Photo

Hi Dears Let me Introduce to you my Notes on The SSDLC Process (AppSec is much bigger than Pentest Process) part 1 I Introduction, First , Second Stage with detailed Inspection about the Threat modelling process Keep Up github.com/0xBugatti/LOLN… JLN (Just LoL notes)

Hi Dears

Let me Introduce to you my Notes on The SSDLC
Process (AppSec is much bigger than Pentest Process)
part 1 I Introduction, First , Second Stage with detailed Inspection about the Threat modelling process 

Keep Up 
github.com/0xBugatti/LOLN…
JLN (Just LoL notes)
0xbugatti (@0xbugatti) 's Twitter Profile Photo

Admin Panel TakeOver 🛑 - Check Registration/ Login response - manipulating API request for Registration/Login medium.com/0xbugatti/eas… #websecurity #owasp #penetrationtesting #bugbountytips #applicationsecurity #oscp #appsec #devsecops by @0xbugatti

0xbugatti (@0xbugatti) 's Twitter Profile Photo

Built a small project over the past few days: OSCP DB A curated database of OSCP-related repositories, filtered to focus on updated and relevant resources instead of outdated material. Repo: github.com/0xbugatti/oscp…⁠� Explore it: oscpdb.vercel.app⁠� preparing for OSCP

Built a small project over the past few days: OSCP DB
A curated database of OSCP-related repositories, filtered to focus on updated and relevant resources instead of outdated material.
Repo:
github.com/0xbugatti/oscp…⁠�
Explore it:
oscpdb.vercel.app⁠�
preparing for OSCP
0xbugatti (@0xbugatti) 's Twitter Profile Photo

Still viewing Nmap results as plain XML! Tip: Using 1 xsl file+ 1 Command can turn them into an enterprise-style visual dashboard with a much cleaner way to explore hosts, ports, services, and findings. That’s one of the tricks I’m building on my Repo: github.com/0xBugatti/Awes…

Still viewing Nmap results as plain XML!
Tip: Using 1 xsl file+ 1 Command can turn them into an enterprise-style visual dashboard with a much cleaner way to explore hosts, ports, services, and findings.
That’s one of the tricks I’m building on my Repo:
github.com/0xBugatti/Awes…
0xbugatti (@0xbugatti) 's Twitter Profile Photo

200 --> Ok But 4xx? 400StillOk Check my New release of custom made 403 Bypass tools with ton of techniques and tips and combinations of "All" techniques you could meet in any Github tool github.com/0xBugatti/400OK