Tahar Amine ELHOUARI

@MrTaharAmine

Cyber Security Consultant / Founder / Founder & CTF-Player / Jack of All Trades

Algeria
Vrijeme pridruživanja: srpanj 2015.
Rođen/a 12. listopada

Tweetovi

Blokirali ste korisnika/cu @MrTaharAmine

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @MrTaharAmine

  1. Prikvačeni tweet
    2. lip 2019.

    This is not a clickbait, this shit is real! Bunch of resources, links and explanations for different fields and stuff! Check it out and start hacking!! Guide 001 | Getting Started in Bug Bounty Hunting:

    Poništi
  2. proslijedio/la je Tweet

    If you need a ramp up into Kali before taking PWK, check out Kali Linux Revealed. This is a free course developed by the creators of Kali Linux, which offers a professional certification:

    Poništi
  3. proslijedio/la je Tweet
    6. velj

    v1.4.0 has been released with few updates to the function, including dark mode. We will be showing a demo at - the Japan Pavillion #2245 in South Expo. ^YU Tool download: RSA Conference:

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    I had some fun exploiting LDAP this week. I'm far from an LDAP expert, so please, bear with me as I try to make some sense of how I went to went from what seemed to be near complete lockdown to owning the domain.

    Poništi
  5. proslijedio/la je Tweet
    5. velj

    [webapps] AVideo Platform 8.1 - Cross Site Request Forgery (Password Reset)

    Poništi
  6. proslijedio/la je Tweet
    5. velj

    No Win32_Process Needed - Expanding the WMI Lateral Movement Arsenal

    Poništi
  7. proslijedio/la je Tweet
    5. velj

    Analyzing WhatsApp Calls with Wireshark, radare2 and Frida by Marvin Schirrmacher 📱🔥

    Poništi
  8. proslijedio/la je Tweet
    5. velj

    We are looking for a Mobile Security Analyst to join our team at ! If you (or someone you know) are interested in this position feel free to DM me or apply here:

    Poništi
  9. proslijedio/la je Tweet
    5. velj

    Pass the Hash - from 12/2019: very well explained and worth to read to really understand this aspect!

    Poništi
  10. proslijedio/la je Tweet
    5. velj

    WinPwnage. Elevate, UAC bypass, persistence, privilege escalation, dll hijack techniques

    Poništi
  11. 4. velj

    Latest Generation MacBook Pro with a Chessboard 🔥💯

    Poništi
  12. proslijedio/la je Tweet
    1. velj
    Poništi
  13. proslijedio/la je Tweet
    1. velj
    Poništi
  14. 2. velj

    I've found the same vulnerability a year ago in a live CTF contest, but I did not report it and I just don't know why :3

    Poništi
  15. proslijedio/la je Tweet
    1. velj

    Windows 10 UAC bypass for all executable files which are autoelevate true.

    Poništi
  16. 1. velj
    Poništi
  17. 1. velj

    Really!!? I thought it is 2020...

    Poništi
  18. proslijedio/la je Tweet
    30. sij
    Poništi
  19. proslijedio/la je Tweet
    30. sij

    Windows Red Team Cheat Sheet 1. Recon 2. Elevation of Privileges 3. Lateral Movement 4. Golden and Silver Tickets 5. AD Attacks 6. Bypass-Evasion Techniques 7. Miscellaneous 8. Post exploitation - information gathering 9. Summary of tools

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  20. proslijedio/la je Tweet
    26. sij

    Worst internet download speed experience. 1. Iraq 2. Algeria 3. Nepal 4. Uzbekistan 5. Ghana 6. Senegal 7. El Salvador 8. Nigeria 9. Cambodia 10. Bangladesh (OpenSignal)

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·