Str4thus (@str4thus) 's Twitter Profile
Str4thus

@str4thus

if it works, it works

ID: 1324701532521172992

calendar_today06-11-2020 13:15:45

128 Tweet

35 Followers

168 Following

Neodyme (@neodyme) 's Twitter Profile Photo

When CS:GO clients connected to our server, they got more than a game. We found 3 RCE vulnerabilities to give clients an unexpected 'welcome'. Ready for a deep-dive? 🎮🔧🎆 neodyme.io/blog/csgo_from… #InfoSec #CSGO #Exploit

shay (@shaybt12) 's Twitter Profile Photo

Path traversal in nuxt huntr.dev/bounties/4849a… when you "/_nuxt/Felipe Silva" in JS script or even in HTML that mean the Dev is enable :) have fun

Path traversal in nuxt

huntr.dev/bounties/4849a…

when you "/_nuxt/<a href="/fs/">Felipe Silva</a>" in JS script or even in HTML
that mean the Dev is enable :) have fun
Shashwat Shah 🇮🇳 (@0xer3bus) 's Twitter Profile Photo

My very first project created a new C2 (ab)using Zoom API to host the C2 traffic. With a c++ written Implant.🚀 Link to the Github repository: github.com/0xEr3bus/Shado… #redteam #infosec #BugBounty #C2 #cybersecurity

Elliot (@elliotkillick) 's Twitter Profile Photo

Creating Windows hacking labs has gotten a lot easier with this new tool I've developed: It's a reverse engineering of Microsoft's hidden downloading API - fully automated to always grab the most up-to-date Windows ISO so you never have to do it again! 🚀 github.com/ElliotKillick/…

MDSec (@mdseclabs) 's Twitter Profile Photo

In our latest post, Matt Johnson details how we were able to publish a malicious VSCode extension to the marketplace and leverage it for initial access during a red team mdsec.co.uk/2023/08/levera… vimeo.com/853281700?shar…

Vulnlab (@vulnlab_eu) 's Twitter Profile Photo

A new Red Team Lab, Shiva, is coming to Vulnlab next week! This time you get to test a hardened Hybrid-AD environment that involves: - Hybrid-AD with 10+ machines & active users - Cloud exploitation - SIEM, EDR on Clients & Servers - Common enterprise software - No CVEs

A new Red Team Lab, Shiva, is coming to Vulnlab next week! This time you get to test a hardened Hybrid-AD environment that involves:

- Hybrid-AD with 10+ machines &amp; active users
- Cloud exploitation
- SIEM, EDR on Clients &amp; Servers
- Common enterprise software
- No CVEs
LuemmelSec (@theluemmel) 's Twitter Profile Photo

Happy to share that I will try to run my own business as a side hustle starting at the beginning of next year. If you are a German follower and are interested or know someone, please feel free to reach out to me. Some info, details etc. can be found here: ds-itconsulting.de/index.html

Happy to share that I will try to run my own business as a side hustle starting at the beginning of next year.
If you are a German follower and are interested or know someone, please feel free to reach out to me.
Some info, details etc. can be found here:
ds-itconsulting.de/index.html
MDSec (@mdseclabs) 's Twitter Profile Photo

Exploiting CVE-2024-20656, a Local Privilege Escalation in the VSStandardCollectorService150 Service mdsec.co.uk/2024/01/cve-20… - new research from Filip Dragovic

Exploiting CVE-2024-20656, a Local Privilege Escalation in the VSStandardCollectorService150 Service mdsec.co.uk/2024/01/cve-20… - new research from <a href="/filip_dragovic/">Filip Dragovic</a>
sec77 (@secure_sec77) 's Twitter Profile Photo

It's been a while since I've solved something on Vulnlab Easter weekend and the new Tengu chain by r0BIT are a good time to start again! If you get stuck, you can check out my writeup! notes.secure77.de/?link=%2FWrite… Happy Easter! 🐰

sec77 (@secure_sec77) 's Twitter Profile Photo

If someone is interested in patching Android apps, I've published a new (beginner) blog post that I wrote some time ago. It's a pretty simple app, but maybe helpful if you've never touched an Android app secure77.de/how-to-mod-a-s…

Mateo Hanžek (@h4nsmach1ne) 's Twitter Profile Photo

Excited to announce our new blog post on new event handlers to trigger XSS! Huge thanks to Bojan Zdrnja for making this happen and to PortSwigger Research for their awesome XSS cheat sheet, now featuring these techniques. infigo.hr/en/insights/46…

Mateo Hanžek (@h4nsmach1ne) 's Twitter Profile Photo

Sharing a new mini research technique that abuses HTML injection to leak data cross-domain. This blogpost connects couple of client-side concepts and a Chrome/RFC Referrer-Policy bug. Inspired by Gareth Heyes \u2028 recent CSP bypass techniques, enjoy :) infigo.is/en/insights/47…

sec77 (@secure_sec77) 's Twitter Profile Photo

I have published a new blog post describing several vulnerabilities that can be chained to get unauthorized RCE in Smart Time Plus < 8.6. secure77.de/smart-time-plu…

CODE WHITE GmbH (@codewhitesec) 's Twitter Profile Photo

Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan

Ten days left. The warm-up fades. Maultaschen were soft. Bean Beats were dark and burnt. But the beats of #ULMageddon will be brutal! #applyIfYouCan
sec77 (@secure_sec77) 's Twitter Profile Photo

New Writeup: Malware deep dive into Zero2Automated Cruloader, a 3-stage malware using RC4+XOR encryption, API hashing via custom ROT13/CRC32, and process hollowing into svchost.exe. #MalwareAnalysis #ReverseEngineering notes.secure77.de/WriteUps/Zero2…

New Writeup: Malware deep dive into Zero2Automated Cruloader, a 3-stage malware using RC4+XOR encryption, API hashing via custom ROT13/CRC32, and process hollowing into svchost.exe. #MalwareAnalysis #ReverseEngineering 
notes.secure77.de/WriteUps/Zero2…