Kasaine (@kasaine17) 's Twitter Profile
Kasaine

@kasaine17

ID: 1019503730239197184

calendar_today18-07-2018 08:46:45

642 Tweet

8 Takipçi

286 Takip Edilen

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

MSSQL for Pentesters: Impersonate 🔥 Telegram: t.me/hackinarticles Learn how attackers abuse the MSSQL impersonation feature to execute queries as another user and escalate privileges, potentially gaining sysadmin access in the database server. 🧠 Topics covered: •

MSSQL for Pentesters: Impersonate

🔥 Telegram: t.me/hackinarticles

Learn how attackers abuse the MSSQL impersonation feature to execute queries as another user and escalate privileges, potentially gaining sysadmin access in the database server.

🧠 Topics covered:
•
Dark Night (@dark_night263) 's Twitter Profile Photo

🌐 𝗧𝘂𝗻2𝘀𝗼𝗰𝗸𝘀 — 𝗧𝗿𝗮𝗻𝘀𝗽𝗮𝗿𝗲𝗻𝘁 𝗣𝗿𝗼𝘅𝘆 𝗥𝗼𝘂𝘁𝗶𝗻𝗴 Route all system traffic through a proxy • Universal proxying (all apps traffic) • Supports HTTP / SOCKS / Shadowsocks / SSH • Cross-platform (Linux, macOS, Windows, BSD) • Gateway mode (route traffic

Raunak Yadush (@raunak_yadush) 's Twitter Profile Photo

Windows 11 has been secretly running a keylogger on your keyboard this whole time and sending every message you type to Microsoft servers. Here's the fix they don't want you to know about Win+R → regedit → HKEY_CURRENT_USER\SOFTWARE\Microsoft\Input\TIPC → Double click

Windows 11 has been secretly running a keylogger on your keyboard

this whole time

and sending every message you type to Microsoft servers.
Here's the fix they don't want you to know about

Win+R → regedit → HKEY_CURRENT_USER\SOFTWARE\Microsoft\Input\TIPC → Double click
Muhammad Ayan (@socialwithaayan) 's Twitter Profile Photo

50 CHROME EXTENSIONS THAT ARE ACTUALLY USEFUL 1. uBlock Origin — block every ad 2. Ghostery — see who tracks you 3. Privacy Badger — auto block trackers 4. ClearURLs — remove tracking from links 5. HTTPS Everywhere — force secure browsing 6. OneTab — collapse all tabs instantly

50 CHROME EXTENSIONS THAT ARE ACTUALLY USEFUL

1. uBlock Origin — block every ad
2. Ghostery — see who tracks you
3. Privacy Badger — auto block trackers
4. ClearURLs — remove tracking from links
5. HTTPS Everywhere — force secure browsing
6. OneTab — collapse all tabs instantly
eleven red pandas (@bytecodevm) 's Twitter Profile Photo

Reversing a legitimately Gigabyte signed Windows kernel driver to map 13 IOCTLs exposing physical memory access, MSR read/write, kernel memcpy, and more, and why this is the foundation of every BYOVD attack. #gdrv3 #driver #BYOVD core-jmp.org/2026/05/gdrv3-…

Reversing a legitimately Gigabyte signed Windows kernel driver to map 13 IOCTLs exposing physical memory access, MSR read/write, kernel memcpy, and more, and why this is the foundation of every BYOVD attack. #gdrv3 #driver #BYOVD
core-jmp.org/2026/05/gdrv3-…
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

📢 New Article: Lateral Movement via Cross-Session Activation 🎙️ Cross-Session activation (CSA) is considered the latest evolution of lateral movement via the Distributed Component Object Model. 🧠 Threat actors with elevated privileges on an asset can leverage cross‑session

📢 New Article: Lateral Movement via Cross-Session Activation 
🎙️ Cross-Session activation (CSA) is considered the latest evolution of lateral movement via the Distributed Component Object Model.  

🧠 Threat actors with elevated privileges on an asset can leverage cross‑session
MajorGeeks (@majorgeeks) 's Twitter Profile Photo

What Is a Security Identifier (SID) and How Can You Find It? Have you ever wondered what keeps your data safe and sound? Enter the Security Identifier, or SID! This unique code plays a crucial role in securing your system by identifying users, groups, and permissions. But how do

What Is a Security Identifier (SID) and How Can You Find It?
Have you ever wondered what keeps your data safe and sound? Enter the Security Identifier, or SID! This unique code plays a crucial role in securing your system by identifying users, groups, and permissions. But how do
Girişimci Hisler (@girisimcihisler) 's Twitter Profile Photo

İnternet hiçbir şeyi unutmaz diyorlar. Yanılıyorlar. Ona unutturmayı bilmeniz gerek. Geçen gün birinin Google Takeout verilerini inceledik. 2001 yılından beri, tam 185 GB veri birikmiş. Konum geçmişinden yıllar önce sildiğini sandığı ses kayıtlarına kadar her şey orada.

İnternet hiçbir şeyi unutmaz diyorlar. Yanılıyorlar. Ona unutturmayı bilmeniz gerek.

Geçen gün birinin Google Takeout verilerini inceledik. 2001 yılından beri, tam 185 GB veri birikmiş. Konum geçmişinden yıllar önce sildiğini sandığı ses kayıtlarına kadar her şey orada.
Olexander (@_aircorridor) 's Twitter Profile Photo

The more experienced a hacker, the stealthier they become. Learn about a tool actively used by cyberwarriors in Ukraine to conceal processes. hackers-arise.com/linux-zapper-h… OccupytheWeb Co11ateral

The more experienced a hacker, the stealthier they become. Learn about a tool actively used by cyberwarriors in Ukraine to conceal processes.

hackers-arise.com/linux-zapper-h…
<a href="/three_cube/">OccupytheWeb</a> <a href="/co11ateral/">Co11ateral</a>
Panos Gkatziroulis 🦄 (@netbiosx) 's Twitter Profile Photo

Yesterday, I published a deep‑dive into how adversaries abuse the 𝐂𝐫𝐨𝐬𝐬-𝐒𝐞𝐬𝐬𝐢𝐨𝐧 𝐀𝐜𝐭𝐢𝐯𝐚𝐭𝐢𝐨𝐧 mechanism to execute code under another user’s interactive session, including some novel CLSIDs to use. ️ The 𝒒𝒖𝒔𝒆𝒓, a built‑in Windows utility, can enumerate

Yesterday, I published a deep‑dive into how adversaries abuse the 𝐂𝐫𝐨𝐬𝐬-𝐒𝐞𝐬𝐬𝐢𝐨𝐧 𝐀𝐜𝐭𝐢𝐯𝐚𝐭𝐢𝐨𝐧 mechanism to execute code under another user’s interactive session, including some novel CLSIDs to use.
️ 
The  𝒒𝒖𝒔𝒆𝒓, a built‑in Windows utility, can enumerate
Adam Chester 🏴‍☠️ (@_xpn_) 's Twitter Profile Photo

If you came to SOCON, you may have seen the fireside chat on Ouroboros (if you weren't too busy counting my "urm"s 😝). The blog post is now live, detailing how we can use Dev-Tunnels for lateral movement, and allow pivoting from GitHub/Entra ID access. specterops.io/blog/2026/05/0…