m0nk3h

@M0nk3H

Infosec Addict. Always Learning.

Maryland, USA
Vrijeme pridruživanja: lipanj 2009.

Tweetovi

Blokirali ste korisnika/cu @M0nk3H

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @M0nk3H

  1. Prikvačeni tweet
    21. kol 2018.

    Tips & Tricks for preparing for the OSCP and eCPPT. Learn about modifying VPN, documentation strategy, aliases, nc tradecraft, logging, automatic backups, host shares, bug fixes and more.

    Poništi
  2. proslijedio/la je Tweet
    4. velj

    Critical Security Flaw Found in WhatsApp Desktop Platform Allowing Cybercriminals Read From The File System Access

    Poništi
  3. proslijedio/la je Tweet
    2. velj
    Poništi
  4. proslijedio/la je Tweet
    2. velj

    WooT! There is always a way. New short write up! Chain the bugs till you get what you want. Some steps were not mentionned. RT, Like and Comments are appreciated. For any pentest work DM me:) 🎉🎉

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. 31. sij

    I have hash starting with ee17f17 and ending in f864

    Poništi
  7. proslijedio/la je Tweet
    31. sij
    Poništi
  8. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    26. sij

    An excellent talk by : clear methodology, novel bugs and interesting links 💯

    Poništi
  10. proslijedio/la je Tweet
    28. sij
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    I created this repo for the people who want to learn about windows logical privilege escalation bugs. You can contact me to add good article which I missed.

    Poništi
  12. 27. sij

    New reading material 🔥🔥 Can’t wait to pickup some new tips and tricks

    Poništi
  13. proslijedio/la je Tweet
    25. sij

    Just finished the writeup for my learning process to replicate the CVE-2019-19470, I also public the source code for exploit and a Masquerade-PEB C#. Hope you enjoy!

    Poništi
  14. proslijedio/la je Tweet
    22. sij

    A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.

    Poništi
  15. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  16. 22. sij

    Yet more amazing that continues to put out for our community

    Poništi
  17. 21. sij

    Infosec community- what is that Microsoft website that allows you to run 30/60/90 day trials of Windows images in a VM?

    Poništi
  18. 20. sij

    Really looking forward to checking this out soon

    Poništi
  19. 17. sij

    Is there a shell handler out there already that plays a sweet sound effect when it catches a shell?

    Poništi
  20. proslijedio/la je Tweet
    13. sij

    Just published a new video: Backdooring an IoT camera by creating a malicious firmware upgrade!

    Prikaži ovu nit
    Poništi
  21. proslijedio/la je Tweet
    13. sij

    Update CVE-2019-19781 You can exploit the vulnerability without the file and only use the file ! You can inject your payload inside the name of the XML file and fire the command execution ! 🔥💪

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·