pickpocket team (@pickpocket001) 's Twitter Profile
pickpocket team

@pickpocket001

Obsessed with Infosec

ID: 2462282971

calendar_today24-04-2014 21:52:18

487 Tweet

569 Takipçi

4,4K Takip Edilen

Today Cyber News (@todaycybernews) 's Twitter Profile Photo

👁 Automated decryption tool powered by artificial intelligence. - Ciphey uses a custom AI engine (AuSearch) with a cipher detection interface to roughly determine what something is encrypted with. It then uses its own custom natural language processing interface that can

Rémi GASCOU (Podalirius) (@podalirius_) 's Twitter Profile Photo

I wrote a new tool to extract all the Bitlocker recovery keys of computers enrolled in a Windows domain 🥳 This is really useful in postexploitation or system administration (to backup keys for example). Export in XLSX, SQLITE, JSON github.com/p0dalirius/Ext… Here is an example:

I wrote a new tool to extract all the Bitlocker recovery keys of computers enrolled in a Windows domain 🥳

This is really useful in postexploitation or system administration (to backup keys for example). Export in XLSX, SQLITE, JSON

github.com/p0dalirius/Ext…

Here is an example:
X (@themsterdoctor1) 's Twitter Profile Photo

Carnage - File Upload (Extension Bypass) - Using various techniques, this tool will try to bypass file upload restrictions. See video below for more information. - Repo: github.com/sAjibuu/upload… - Video: youtube.com/watch?v=quFoDy… - - #cybersecurity #bugbountytips #CTF #infosecurity

Carnage - File Upload (Extension Bypass)
-
Using various techniques, this tool will try to bypass file upload restrictions. See video below for more information.
-
Repo: github.com/sAjibuu/upload…
-
Video: youtube.com/watch?v=quFoDy…
-
-
#cybersecurity #bugbountytips #CTF #infosecurity
HackGit (@hack_git) 's Twitter Profile Photo

VcenterKit Vcenter Comprehensive Penetration and Exploitation Toolkit github.com/W01fh4cker/Vce… #infosec #pentesting #redteam

VcenterKit

Vcenter Comprehensive Penetration and Exploitation Toolkit

github.com/W01fh4cker/Vce…

#infosec #pentesting #redteam
Today Cyber News (@todaycybernews) 's Twitter Profile Photo

CVE-2023-43770 mail server Roundcube * usage: python cve-2023-43770.py -e [email protected] -p Attack3rPwd -t [email protected] * POC exploit github.com/s3cb0y/CVE-202… 👀 Check Out Old Tweets Of Today Cyber News #cybersecurity #BugBounty #infosec #CVE

CVE-2023-43770
mail server Roundcube
*
usage:
python cve-2023-43770.py -e attacker@gmail.com -p Attack3rPwd -t victim@example.com
*
POC exploit 
github.com/s3cb0y/CVE-202…

👀 Check Out Old Tweets Of <a href="/TodayCyberNews/">Today Cyber News</a>

#cybersecurity #BugBounty #infosec  #CVE
fortunato lodari (@flodari) 's Twitter Profile Photo

AD: Local Admin to Domain Admin It doesn't matter if you don't see active sessions, always look in the Kerberos cache. query session VS klist sessions Don't attempt an LSASS DUMP, move on! GIUDA 2023090500 Now FUD again github.com/foxlox/GIUDA #redteam #adprivesc #kerberos

AD: Local Admin to Domain Admin

It doesn't matter if you don't see active sessions, always look in the Kerberos cache.

query session VS klist sessions

Don't attempt an LSASS DUMP, move on!

GIUDA 2023090500
Now FUD again

github.com/foxlox/GIUDA

#redteam #adprivesc #kerberos
shubs (@infosec_au) 's Twitter Profile Photo

Our team at Assetnote has published the blog post on the Progress WS_FTP RCE (CVE-2023-40044). It was fun to find an RCE in the middleware layer (IIS HTTP Module), and it was also quite surprising that the exploit did not require authentication: assetnote.io/resources/rese…

Our team at <a href="/assetnote/">Assetnote</a> has published the blog post on the Progress WS_FTP RCE (CVE-2023-40044). It was fun to find an RCE in the middleware layer (IIS HTTP Module), and it was also quite surprising that the exploit did not require authentication: assetnote.io/resources/rese…
Sprocket Security (@sprocketsec) 's Twitter Profile Photo

Crawl every SMB shares on every target system for juicy information with MANSPIDER! File types supported: ✅ PDF ✅ DOCX ✅ XLSX ✅ PPTX ✅ any text-based format ✅ and many more! Install today 👇 github.com/blacklanternse…

Crawl every SMB shares on every target system for juicy information with MANSPIDER! 

File types supported:
✅ PDF
✅ DOCX
✅ XLSX
✅ PPTX
✅ any text-based format
✅ and many more!

Install today 👇

github.com/blacklanternse…
Matt Johansen (@mattjay) 's Twitter Profile Photo

A new container escape vulnerability just dropped. It gives an attacker the ability to hop from container to host OS via runc.

Matt Johansen (@mattjay) 's Twitter Profile Photo

These demos show a container being able to read /etc/shadow via docker run or docker build commands. They're pulling specifically crafted images with the exploit preloaded

🕳 (@sekurlsa_pw) 's Twitter Profile Photo

“Fully automated windows credentials dumper, from SAM (classic passwords) and WINHELLO (pins)1️⃣. Runs from a linux machine with a mounted win drive.” 1️⃣ Doesn’t work if system’s TPM protects the keys. hashcat -m 1000 <sam> hashcat -m 28100 <pin> #hashes #hashcat

“Fully automated windows credentials dumper, from SAM (classic passwords) and WINHELLO (pins)1️⃣. Runs from a linux machine with a mounted win drive.” 

1️⃣ Doesn’t work if system’s TPM protects the keys. 

hashcat -m 1000 &lt;sam&gt;
hashcat -m 28100 &lt;pin&gt;

#hashes #hashcat
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

Use NextJS? Recon ✨

A quick way to find "all" paths for Next.js websites:
DevTools-&gt;Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips
BobPony.com (@thebobpony) 's Twitter Profile Photo

Run apps made for .NET Framework 2.0 and 3.x in Windows 11 Version 26H1 (down to Windows 8.x) without installing .NET 3.5. Copy this below into a text editor and save as a .reg file then open it, if successful .NET framework 2.0 and 3.x apps should open without issue: Windows