Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile
Miguel Méndez Zúñiga

@s1kr10s

Researcher, Reverser, Pentester, and Speaker. Hacking is my profession and passion. Holder of Offensive security certs: OSCP, OSWP, OSCE, OSWE, OSED.

ID: 76567289

linkhttps://s1kr10s.github.io calendar_today23-09-2009 05:22:56

3,3K Tweet

1,1K Takipçi

125 Takip Edilen

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec #SoftwareExploitation #RE exploitation.ashemery.com

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec #SoftwareExploitation #RE

exploitation.ashemery.com
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3 Blog post by Maurice Heumann buff.ly/3Xwv5N #reverseengineering

Reverse engineering the runtime code integrity protection of Call of Duty: Black Ops 3 
Blog post by <a href="/momo5502/">Maurice Heumann</a>

buff.ly/3Xwv5N

#reverseengineering
Cerbero Labs (@cprofiler) 's Twitter Profile Photo

Extreme PowerShell Obfuscation: blog.cerbero.io/?p=2709 The following is valid PowerShell code: ${;}=+$();${=}=${;};${+}=++${;};${@}=++${;};${.}=++${;};${[}=++${;}; ${]}=++${;};${(}=++${;};${)}=++${;};${&}=++${;};${|}=++${;};

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Embedded device firmware (Yaesu FT-70D radio) reverse engineering Interesting blog post by lander buff.ly/3YuutIS #embedded #reverseengineering #infosec

Embedded device firmware (Yaesu FT-70D radio) reverse engineering
Interesting blog post by <a href="/landaire/">lander</a> 

buff.ly/3YuutIS

#embedded #reverseengineering #infosec
Al Qantarat "66" (@juannave) 's Twitter Profile Photo

TRES PUNTOS LUMINOSOS APARECEN EN EL CIELO DE PALESTINA E ISRAEL EN MEDIO DE LOS ATAQUES Y SE MANTIENEN INMOVILES DURANTE 4 MINUTOS 36 SEGUNDOS. HASTA EL MOMENTO, NINGUN MEDIO DE COMUNICACION O GOBIERNO HA DADO ALGUNA EXPLICACION AL FENOMENO.

FalconFeeds.io (@falconfeedsio) 's Twitter Profile Photo

A forum user claims to have breached the Senado De La Republica (senado.gob.mx). They claims to have over 1,000 private government documents from September to October and the total size of the files is 19.4GB. #Mexico #databreach #dataleak #cti #darkweb

A forum user claims to have breached the Senado De La Republica (senado.gob.mx). They claims to have over 1,000 private government documents from September to October and the total size of the files is 19.4GB.

#Mexico #databreach #dataleak #cti #darkweb
Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

Here, I am sharing a new article in which my friend dplastico (pwn) 🤜 🤛 and I conducted research on specific antivirus binaries. As a result of our investigation, we successfully secured the assignment of CVE-2024-23940 from @TrendMicro. #cve #research medium.com/@s1kr10s/av-wh…

Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

Chamilo LMS 1.11.14: Analysis of Two Blind SQL Injection Vulnerabilities #exploit #reversing #research #infosec infosecwriteups.com/chamilo-lms-1-…

Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

When you find a bypass for Cortex XDR and realize it's not just a simple bypass, but a potential 0day. #hacking #edr #xdr #cortex #research #cybersecurity #infosec #redteam #evasionedr #pentest #malware #offsec

Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

I'm sharing a small site where I'll be uploading solved challenges along with their exploitation techniques. I haven't uploaded the binaries yet, but they're coming soon - it's a work in progress! s1kr10s.github.io/ctf/ctf.html #ctf #exploit #linux #reversing #offsec

I'm sharing a small site where I'll be uploading solved challenges along with their exploitation techniques. I haven't uploaded the binaries yet, but they're coming soon - it's a work in progress!

s1kr10s.github.io/ctf/ctf.html
#ctf #exploit #linux #reversing #offsec
Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

It is a Firebase configuration that was exposed and could be used for malicious purposes, such as a command-and-control (C2) server, keylogger, or for data exfiltration. ✌ #redteam #pentest #offsec youtube.com/watch?v=tVf7Ub…

Miguel Méndez Zúñiga (@s1kr10s) 's Twitter Profile Photo

🚨 NASA Login discovered!
Defender Security (<4.1.0) allows bypassing hidden login pages.
By abusing auth_redirect (CVE-2023-5089) + URL path manipulation, HTTP 403 can be bypassed. #CyberSecurity #BugBounty #EthicalHacking #Infosec youtu.be/yIx0XLx-iRQ