Andrei Scutariu (@xnand_) 's Twitter Profile
Andrei Scutariu

@xnand_

cybersecurity something

ID: 2768136599

calendar_today12-09-2014 18:11:46

27 Tweet

256 Followers

289 Following

JUMPSEC LABS (@jumpseclabs) 's Twitter Profile Photo

The new blog post by dylan is now live. Say goodbye to your event logs 😉 labs.jumpsec.com/2020/09/04/pwn… #RedTeam #PenTest #Hacking #BlueTeam #WhereAreMyLogs

JUMPSEC LABS (@jumpseclabs) 's Twitter Profile Photo

Advisory CVE-2020-13774 – Ivanti Unified Endpoint Manager authenticated RCE via file upload labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #rce #cve

JUMPSEC LABS (@jumpseclabs) 's Twitter Profile Photo

Advisory CVE-2020-13769 – Ivanti Unified Endpoint Manager SQL injection labs.jumpsec.com/advisory-cve-2… #ivanti #landesk #cve #sqli

JUMPSEC LABS (@jumpseclabs) 's Twitter Profile Photo

Detecting known DLL hijacking and named pipe token impersonation attacks with Sysmon labs.jumpsec.com/detecting-know… #sysmon #blueteam #privesc #detection

Alisa Esage Шевченко (@alisaesage) 's Twitter Profile Photo

☀️ Summer Solstice philanthropy: I am making this mini-class available for free! 4 hours of deeply systematical theory & practice introduction on hypervisor vulns and how to find them, taught by a specialist researcher, bug hunter and pwner 🔥 How to claim your seat, thread 👉🏻

Manish Kishan Tanwar (@indishell1046) 's Twitter Profile Photo

I published the writeup of "Exploiting Hibernate Injection (HQL) in "Order by" Clause (Oracle database)" which we found during an assessment. mannulinux.org/2023/03/exploi… Special Thanks to: Soroush Dalili sir and Noman Riffat bhai ji #injection #websecurity #bugbountytips #Pentesting

GhostCcamm (@ghostccamm) 's Twitter Profile Photo

Nicolas Krassas This project is backdoored and fake. DO NOT RUN THIS POC! For an example, here is their exploit for CVE-2023-20871: github.com/ChriSanders22/… That code looks very similar hmm....

Andrei Scutariu (@xnand_) 's Twitter Profile Photo

@johnregehr uhm, some of them work, others doesn't, at least for me. I'm trying to access to intger overflow in C/C++ but get /#pubstosem14.