Mrsaighnal (@mrsaighnal) 's Twitter Profile
Mrsaighnal

@mrsaighnal

OSCP | OSEP | OSWE | OSWP | CRTO | CRTP | eCPTX | eWPTX | eCPPT | Master's Degree in Cybersecurity

ID: 1308486183966650368

linkhttps://aptw.tf calendar_today22-09-2020 19:19:58

15 Tweet

90 Followers

31 Following

Paolo Stagno (VoidSec) (@void_sec) 's Twitter Profile Photo

CVE-2021-41285 - Crucial's Ballistix MOD Utility v.<= 2.0.2.5 is affected by multiple Privilege Escalation (LPE) vulnerabilities in the MODAPI.sys driver. voidsec.com/crucial-mod-ut…

Advanced Persistent Tortellini (@aptortellini) 's Twitter Profile Photo

Per puntualizzare: gli unici che scrivono/collaborano con i tortellini sono le persone alla pagina aptw.tf/about/. Chi dice il contrario si sta facendo solo pubblicità ¯\_(ツ)_/¯

Paolo Stagno (VoidSec) (@void_sec) 's Twitter Profile Photo

My write-up for the Blue Frost Security Windows Exploitation Challenge released during Ekoparty: voidsec.com/windows-exploi… Thanks Blue Frost Security for the challenge, I've enjoyed it very much

Mrsaighnal (@mrsaighnal) 's Twitter Profile Photo

GCR - Google Calendar RAT is a proof-of-concept of a Command & Control protocol leveraging the Google Calendar service. Commands and their corresponding outputs are exchanged through the "description" field of an event. Star it if you like it github.com/MrSaighnal/GCR…

Mrsaighnal (@mrsaighnal) 's Twitter Profile Photo

My research project 'Google Calendar RAT' was cited by Google in their 'Q3 2023 Threat Horizons Report.' - Learn more and star on GitHub: github.com/MrSaighnal/GCR… - Read the Google report (page 12): services.google.com/fh/files/blogs… #Google #GCR #Malware

My research project 'Google Calendar RAT' was cited by Google in their 'Q3 2023 Threat Horizons Report.' 
- Learn more and star on GitHub: github.com/MrSaighnal/GCR…
- Read the Google report (page 12): services.google.com/fh/files/blogs… 

#Google #GCR #Malware
Mrsaighnal (@mrsaighnal) 's Twitter Profile Photo

GSR serves as a proof of concept for an infrastructure-less Command&Control (C2) mechanism utilizing Google Slides documents. This tool is beneficial for scenarios where exposing a Red Teaming infrastructure is undesirable. github.com/MrSaighnal/GSR…

Mrsaighnal (@mrsaighnal) 's Twitter Profile Photo

🚨 NASA Bug Bounty Disclosure 🚨 Found & reported a vulnerability in NASA systems via their bug bounty program. Just dropped the write-up: 🔗 blog.keephack.ing/2025-02-17-Hou… Feedback welcome. 🛰️ #BugBounty #OffSec #Infosec #Hacking #NASA #VulnResearch #Disclosure