opetz (@wanzroot) 's Twitter Profile
opetz

@wanzroot

I am a student who likes technology, especially in the field of digital information security. #RedTeam #Pentester

ID: 1412649415437807617

calendar_today07-07-2021 05:47:29

1,1K Tweet

53 Takipçi

241 Takip Edilen

Logan Goins (@_logangoins) 's Twitter Profile Photo

I'm super happy to announce an operationally weaponized version of Yuval Gordon's BadSuccessor in .NET format! With a minimum of "CreateChild" privileges over any OU it allows for automatic escalation to Domain Admin (DA). Enjoy your inline .NET execution! github.com/logangoins/Sha…

rootsecdev (@rootsecdev) 's Twitter Profile Photo

I know some have been concerned that I’m not posting enough hacking content. Rest assured I’m still at it. The new Kerberos reflective relay attack is hot 🔥no need to apply a patch to krbrelayx, just get into smbrelayserver.py and remove the NTLM mech type and you are g2g.

I know some have been concerned that I’m not posting enough hacking content. Rest assured I’m still at it. The new Kerberos reflective relay attack is hot 🔥no need to apply a patch to krbrelayx, just get into smbrelayserver.py and remove the NTLM mech type and you are g2g.
Pethuraj M (@pethuraj) 's Twitter Profile Photo

🌀 𝗦𝗺𝘂𝗴𝗴𝗹𝗲𝗙𝘂𝘇𝘇 - A modular HTTP request smuggling fuzzer built for deep desync exploration. 👉 github.com/moopinger/smug… Perfect for testing reverse proxies, finding obscure smuggling vectors, and pushing fuzzing boundaries. #CyberSecurity #RedTeam #BugBounty

🌀 𝗦𝗺𝘂𝗴𝗴𝗹𝗲𝗙𝘂𝘇𝘇 - A modular HTTP request smuggling fuzzer built for deep desync exploration.
👉 github.com/moopinger/smug…

Perfect for testing reverse proxies, finding obscure smuggling vectors, and pushing fuzzing boundaries.

#CyberSecurity #RedTeam #BugBounty
Alex (@xaitax) 's Twitter Profile Photo

Chrome App-Bound Encryption Decryptor v0.11 is here! 🚀 As a learning project, I've implemented a new Kernel-Level Execution Syscall Engine. It fuses Halo's Gate SSN deduction with a Tartarus Gate fallback for enhanced resilience against EDR hooks - fully operational on x64 &

Chrome App-Bound Encryption Decryptor v0.11 is here! 🚀

As a learning project, I've implemented a new Kernel-Level Execution Syscall Engine. It fuses Halo's Gate SSN deduction with a Tartarus Gate fallback for enhanced resilience against EDR hooks - fully operational on x64 &
¯\_(ツ)_/¯ (@chocapikk_) 's Twitter Profile Photo

WPProbe 0.7.0 is out! 🚀 Added: • list - preview total CVEs in the Wordfence DB • search - lookup by CVE ID, plugin name, title, severity & more 👉 github.com/Chocapikk/wppr…

WPProbe 0.7.0 is out! 🚀 Added:
• list - preview total CVEs in the Wordfence DB
• search - lookup by CVE ID, plugin name, title, severity & more
👉 github.com/Chocapikk/wppr…
dax (@thdxr) 's Twitter Profile Photo

opencode rewrite is done and ready for general use - works with claude pro/max - beautiful themeable tui - shareable links for any session - zero config LSP support - works with 75+ LLM providers (including local) link in reply

opencode rewrite is done and ready for general use

- works with claude pro/max
- beautiful themeable tui
- shareable links for any session
- zero config LSP support
- works with 75+ LLM providers (including local)

link in reply
Ivan Spiridonov (@xbz0n) 's Twitter Profile Photo

Mythic C2 with redirectors & EarlyBird injection beats Windows 11’s Defender - signature & behavior. Dive in: xbz0n.sh/blog/mythic-c2… #RedTeaming #C2Infrastructure #C2

Aditya Shende (@adityashende17) 's Twitter Profile Photo

The Story of : Recon Meant Almost Nothing kongsec.medium.com/how-getting-st… #BugBounty #CyberSecurity #Infosec #ResponsibleDisclosure #Kongsec #ApplicationSecurity #Recon #bugcrowd #hackerone

dreadnode (@dreadnode) 's Twitter Profile Photo

Read our breakdown of Claude's attack sequence against the notoriously hard-to-solve "turtle" challenge: dreadnode.io/blog/ai-red-te…

Read our breakdown of Claude's attack sequence against the notoriously hard-to-solve "turtle" challenge: dreadnode.io/blog/ai-red-te…
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''Doppelganger: An Advanced LSASS Dumper with Process Cloning'' #infosec #pentest #redteam #blueteam labs.yarix.com/2025/06/doppel…

Anton (@therceman) 's Twitter Profile Photo

Bug Bounty Tip If you found directory listing vulnerability on PHP server, check these common paths for session files: - /var/lib/php5/ - /var/lib/php/session/ - /var/lib/php/sessions/ - /opt/plesk/php/sessions/ - /var/lib/php/mod_php/session/ - /tmp/ ;- /var/tmp/ ;- /dev/shm/

Bug Bounty Tip

If you found directory listing vulnerability on PHP server, check these common paths for session files:

- /var/lib/php5/
- /var/lib/php/session/
- /var/lib/php/sessions/
- /opt/plesk/php/sessions/
- /var/lib/php/mod_php/session/
- /tmp/ ;- /var/tmp/ ;- /dev/shm/