Bastian Muhlhauser (@xpl0ited11) 's Twitter Profile
Bastian Muhlhauser

@xpl0ited11

OSEP | OSCP | OSWE | eMAPT | CTF Player @Cntr0llz | Owner of @xpl0ited1 | This is my ‘not expropiated’ account

ID: 1413884733340143622

linkhttps://www.xpl0ited1.io calendar_today10-07-2021 15:36:20

577 Tweet

646 Takipçi

766 Takip Edilen

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n #Offsec #SoftwareExploitation #RE exploitation.ashemery.com

Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec #SoftwareExploitation #RE

exploitation.ashemery.com
James Kettle (@albinowax) 's Twitter Profile Photo

To verify the single-packet attack is working for you: - Load examples/benchmark-h2-race.py - Hit attack, then verify ‘Best/Median’ are 0/1 via Extensions>Turbo Intruder>Output - This shows a typical execution spread of 1ms when sending groups of 20 requests to Ireland

To verify the single-packet attack is working for you:
- Load examples/benchmark-h2-race.py
- Hit attack, then verify ‘Best/Median’ are 0/1 via  Extensions>Turbo Intruder>Output
- This shows a typical execution spread of 1ms when sending groups of 20 requests to Ireland
César (@cesarsilence) 's Twitter Profile Photo

Hola amigos! hace unas semanas me llegó una polera del #RedTeamVillage y la queremos sortear junto a Cntr0llz por lo que preparamos un reto y el primero que lo resuelva enviándome la flag por DM se la lleva! <hint>cntr0llz.cl</hint> (reto solo para gente de 🇨🇱)

HADESS (@hadess_security) 's Twitter Profile Photo

The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals. Article: hadess.io/the-art-of-hid… EBook: hadess.io/the-art-of-hid… #windows #redteam

The Art Of Hiding In Windows: techniques used by malicious actors to obscure their activities, making detection and analysis significantly more challenging for security professionals.

Article: hadess.io/the-art-of-hid…

EBook: hadess.io/the-art-of-hid…

#windows #redteam
James Kettle (@albinowax) 's Twitter Profile Photo

The inevitable has finally happened - someone's used a technique I published to hack a website I made. 0x999 used the single-packet attack to get double points on a hackxor mission and top the leaderboard, then thoughtfully notified me 😂 hackxor.net/leaderboard

Octagon Networks (@octagonnetworks) 's Twitter Profile Photo

You can now bypass CSP on any website that allows github.com in a script-src or default-src PoC: <script src=api.github.com/gist/anything?…></script> Despite character limitations, you can use the Same Origin Method Execution technique we shared to get full XSS.

You can now bypass CSP on any website that allows github.com in a script-src or default-src

PoC: &lt;script src=api.github.com/gist/anything?…&gt;&lt;/script&gt;

Despite character limitations, you can use the Same Origin Method Execution technique we shared to get full XSS.
Offensive OSINT (@the_wojciech) 's Twitter Profile Photo

Today is the day! Open Source Surveillance is complete and open for registration! Choose from over 25 modules and take intelligence gathering to a whole new level. #osint #privacy #intelligence #infosec os-surveillance.io

Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

"pandora: A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers." #infosec #pentest #redteam github.com/efchatz/pandora

"pandora: A red team tool that assists into extracting/dumping master credentials and/or entries from different password managers."

#infosec #pentest #redteam 
github.com/efchatz/pandora
Gray Hats (@the_yellow_fall) 's Twitter Profile Photo

CVE-2023-51385: OpenSSH OS command injection vulnerability The vulnerability is tracked under the CVE identifier CVE-2023-51385 (CVSS score: 9.8). It impacts all versions of OpenSSH before 9.6p1. meterpreter.org/cve-2023-51385…

ippsec (@ippsec) 's Twitter Profile Photo

For the people that hate on "err != nil" of go, this is a great video. Its not perfect but it is damn simple, which is "the go way". Every language has its own things it excels at. Trying other langs will improve your overall skill more than mastering 1. youtube.com/watch?v=YZhwOW…

shubs (@infosec_au) 's Twitter Profile Photo

Some really cool AWS enumeration research was released today by Daniel Grzelak that's worth reading and understanding: blog.plerion.com/conditional-lo…

Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 (@elder_plinius) 's Twitter Profile Photo

⛓️ JAILBREAK ALERT ⛏️ OPENAI: PWNED 😎 GPT-4-TURBO: LIBERATED 🔓 Bear witness to GPT-4 sans guardrails, with outputs such as illicit drug instructions, malicious code, and copyrighted song lyrics-- the jailbreak trifecta! This one wasn't easy. OpenAI's defenses are cleverly

⛓️ JAILBREAK ALERT ⛏️

OPENAI: PWNED 😎
GPT-4-TURBO: LIBERATED 🔓

Bear witness to GPT-4 sans guardrails, with outputs such as illicit drug instructions, malicious code, and copyrighted song lyrics-- the jailbreak trifecta!

This one wasn't easy. OpenAI's defenses are cleverly
🤷‍♂️ (@floesen_) 's Twitter Profile Photo

Did you know that LSASS has the ability to execute arbitrary kernel-mode addresses? I wrote a small proof of concept that allows administrators to execute unsigned code in the kernel if LSA Protection is disabled. github.com/floesen/KExecDD

Brut 🇮🇳 (@wtf_brut) 's Twitter Profile Photo

📢a XSS payload, Cuneiform-alphabet based ! 𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++], 𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀] +(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀] +𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")() #bugbounty #bugbountytips

📢a XSS payload, Cuneiform-alphabet based !  𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++], 𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀] +(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀] +𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")()  

#bugbounty #bugbountytips
Moblig (@moblig_) 's Twitter Profile Photo

$10,000 for RCE through Dependency Confusion, this time on one of my first submissions in Intigriti 🙌 I spent a whole month learning and developing a custom tool using Next.js, this helped me identify and exploit the RCE. Of course, I also used: medium.com/@alex.birsan/d…

$10,000 for RCE through Dependency Confusion, this time on one of my first submissions in <a href="/intigriti/">Intigriti</a> 🙌
I spent a whole month learning and developing a custom tool using Next.js, this helped me identify and exploit the RCE.
Of course, I also used: medium.com/@alex.birsan/d…