Smukx.E(@5mukx) 's Twitter Profile Photo

Malware Development Series

ShellExec Through Syscalls: github.com/Whitecat18/Rus…
Local Thread Hijacking: github.com/Whitecat18/Rus…
Remote Thread Hijacking: github.com/Whitecat18/Rus…

urity

Malware Development Series

ShellExec Through Syscalls: github.com/Whitecat18/Rus…
Local Thread Hijacking: github.com/Whitecat18/Rus…
Remote Thread Hijacking: github.com/Whitecat18/Rus…

#maldev #rust #redteam #cybersecurity #infosecurity #infosec #security #thread #development
account_circle
Smukx.E(@5mukx) 's Twitter Profile Photo

Malware Development Series
Process Argument Spoofing: github.com/Whitecat18/Rus…
Process Exec Through Fibers: github.com/Whitecat18/Rus…
Process Hypnosis: github.com/Whitecat18/Rus…

Tried Something New ..!
urity

Malware Development Series
Process Argument Spoofing: github.com/Whitecat18/Rus…
Process Exec Through Fibers: github.com/Whitecat18/Rus…
Process Hypnosis: github.com/Whitecat18/Rus…

Tried Something New ..!
#maldev #rust #redteam #cybersecurity #infosecurity #infosec #security #process
account_circle
Otterly(@ott3rly) 's Twitter Profile Photo

Another useful thing that sqlmap has is the Google Dorking flag. Combine with your favorite dork increase change finding SQLi:
sqlmap -g 'site:target.com inurl:\'.php?id=1\''

Another useful thing that sqlmap has is the Google Dorking flag. Combine with your favorite dork increase change finding SQLi:
sqlmap -g 'site:target.com inurl:\'.php?id=1\''

#SQLi #infosecurity #cybersecurity
account_circle