ps-aux-grep root (@auxgrep) 's Twitter Profile
ps-aux-grep root

@auxgrep

cybersecurity | Ethical hacker | Consultant | Linux Programmer 🇹🇿

ID: 1249999434169159681

linkhttps://github.com/AuxGrep calendar_today14-04-2020 09:54:43

3,3K Tweet

5,5K Takipçi

141 Takip Edilen

Ayeem Ndimbo (@ally_ndimbo) 's Twitter Profile Photo

Time to find the chinks in the armor! Penetration testing, system auditing, and vulnerability scanning on the agenda today. #proactivedefense #cybersecurity

Time to find the chinks in the armor! Penetration testing, system auditing, and vulnerability scanning on the agenda today. #proactivedefense #cybersecurity
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

After the loader on my Dark Eagle stopped working, I decided to create a more powerful one for advanced ARP spoofing attacks Are you a one or zero ??? Check it out github.com/AuxGrep/ARP-sp…

After the loader on my Dark Eagle stopped working, I decided to create a more powerful one for advanced ARP spoofing attacks

Are you a one or zero ??? Check it out 
github.com/AuxGrep/ARP-sp…
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Developers, controlling OTP submission attempts using user agents or public IPs is ineffective. Can be easily bypassed, allowing brute force attacks on 6-digit OTPs. 😂

Developers, controlling OTP submission attempts using user agents or public IPs is ineffective. Can be easily bypassed, allowing brute force attacks on 6-digit OTPs. 😂
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Introducing the world’s first AMSI bypass using a stager with an EAS-encrypted payload, all sneaked in through a crafted PHP file. Windows Defender latest version ? Oh, it was there . AVs bypassed 🎤

Jenipha Edephonce (@jennyedephonce) 's Twitter Profile Photo

Kama vile PC Yako unavyoweka Anti-Virus hivyo hivyo na Simu yako unataka uwe Anti-Virus. Zipo Premium Anti-Virus kutoka Kampuni mbali mbali. Nimekuwekea hapo chini👇 #CybersecurityAwarenessMonth

ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

I’m exploring different ways to deliver a stub. What if we write code to generate a malicious PDF that could deploy the stub to a victim? I made this for educational purposes. Gmail 🥹

I’m exploring different ways to deliver a stub. What if we write code to generate a malicious PDF that could deploy the stub to a victim?

I made this for educational purposes.

Gmail 🥹
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Mshikaji wangu Ayeem Ndimbo aliniambia kaka embu nusa mac pc hutotoka , nimeamini aseeee Nikasema nivuute angalau 2021 M1 pro ya 16GB aseee Nimeweka vms leo kama zoteeee , aseee hawa jamaa kwenye memory management wanajua.

Mshikaji wangu <a href="/ally_ndimbo/">Ayeem Ndimbo</a> aliniambia kaka embu nusa mac pc hutotoka , nimeamini aseeee 

Nikasema nivuute angalau 2021 M1 pro ya 16GB aseee

Nimeweka vms leo kama zoteeee , aseee hawa jamaa kwenye memory management wanajua.
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Building a powerful File Integrity Monitoring and Anti-Malware system that: 1. Uses VT Sandbox for file analysis 2. Sends real-time alerts to administrators and servers for anomalies 4. Activates active response for detected threats 3.Allows remote client control from anywhere

ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

#Windows #CyberSecurity Upgrade_Engine.ps1 is a PowerShell script written by AuxGrep to help administrators seamlessly upgrade Win 10 workstations to Win 11. It works silently via Group Policy from a Domain Controller locally using a single ISO file. github.com/AuxGrep/upgrad…

ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Day 1: [email] The attacker sends “receipt.jpg”with hidden malware in its metadata, posing as proof of a payment error. Day 2: [email] Attacker sends an Excel file with a hidden macro code, the macro extracts the malware from “receipt.jpg” and runs it silently in memory.

Day 1: [email] The attacker sends “receipt.jpg”with hidden malware in its metadata, posing as proof of a payment error.

Day 2: [email] Attacker sends an Excel file with a hidden macro code, 
the macro extracts the malware from “receipt.jpg” and runs it silently in memory.
ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

A sophisticated Command-and-Control (C2) payload management framework designed for educational purposes and authorized penetration testing only. Built with advanced evasion techniques and modular architecture. #CyberSecurity #Hacking github.com/AuxGrep/TzCybe…

ps-aux-grep root (@auxgrep) 's Twitter Profile Photo

Hello offer ya leo kwa all my courses 1. Get started with Pentesting 60000 tsh 2. Wireless network Pentesting - 50000 tsh Table teaching: 250000 tsh Check me out: 0625524872