Sr.Penetration Tester

@Pentester2020

Amin Shahmohammadi ,CCIE SEC,CISSP, GXPN,GREM,GCIA,OSCE## I am a bloody hacker!!!

Vrijeme pridruživanja: svibanj 2013.

Tweetovi

Blokirali ste korisnika/cu @Pentester2020

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @Pentester2020

  1. Prikvačeni tweet

    CTF{Training_CTF_Bootcamp_Moscow}

    Poništi
  2. proslijedio/la je Tweet
    prije 11 sati

    Time is running short via

    Poništi
  3. proslijedio/la je Tweet

    Don’t stop learning.

    Poništi
  4. proslijedio/la je Tweet
    3. velj

    The 25th Bond film will change everything… releasing April 2020

    Poništi
  5. proslijedio/la je Tweet
    19. sij

    A great Windows 10 heap grooming and exploitation blog post by in case you missed it last year:

    Poništi
  6. proslijedio/la je Tweet
    27. sij

    10 seats left for the beta run of SANS SEC588 - Cloud Penetration Testing starting on March 23rd in Arlington, VA. These seats will be gone this week. This first beta run is 50% off.

    Poništi
  7. proslijedio/la je Tweet
    30. sij
    Poništi
  8. proslijedio/la je Tweet
    31. sij

    PHP 0day : PHP 7.0-7.4 disable_functions bypass : Some more Exploits :

    Poništi
  9. proslijedio/la je Tweet
    21. sij

    If only this was the first time Q had to rebuild 007's DB5...

    Poništi
  10. proslijedio/la je Tweet
    30. sij

    A machine a day keeps the doctor away 🍏 Fatty will go live Feb 1 2020 at 19:00:00 UTC. RE will be retired! You still have time to hack your way in at

    Poništi
  11. proslijedio/la je Tweet
    28. sij

    [Educational] One of the best blog posts that I ever read about going from 0 to unauth RCE in f**king Mikrotik OS step by step:

    Prikaži ovu nit
    Poništi
  12. proslijedio/la je Tweet
    29. sij

    Dear Community, it's o'clock! ⏱️ It's time to give your 🗳️ What is your favorite Challenge Category to practice your skills?

    Poništi
  13. proslijedio/la je Tweet
    28. sij

    2020-01-28: 🔒 | Researcher Taunting | Inside Malware Message 😆If I am Polish, then is Ukranian. As discovered by ⏩OutputDebugStringW(lpOutputString) Definitely researcher obsession by Maze

    Poništi
  14. proslijedio/la je Tweet
    26. sij

    More information about this can be found on our blog

    Prikaži ovu nit
    Poništi
  15. proslijedio/la je Tweet
    1. pro 2019.

    10K TryHackMe Registered Users! 🎉 We launched last November and what a journey its been. Thank you for all the support! Retweet and have a chance of winning a THM subscription and swag. Happy Hacking.

    Poništi
  16. proslijedio/la je Tweet
    28. sij
    Poništi
  17. proslijedio/la je Tweet
    28. sij

    Thanks for the inclusion in the awesome new book. and . Flipped through it, and it looks great! Very excited to dig into it on my flight tomorrow. Edition 😁👌🤣

    Poništi
  18. proslijedio/la je Tweet
    28. sij

    New blog (and tool): Attacking Azure, Azure AD, and Introducing PowerZure

    Prikaži ovu nit
    Poništi
  19. proslijedio/la je Tweet
    28. sij

    A Red Teamer’s Guide to GPOs and OUs

    Poništi
  20. proslijedio/la je Tweet
    28. sij

    2020-01-27:🔥🆕 🔒| Cert -> 🇱🇹[UAB GT-servis] ⚙️January 20 Build 1⃣🇷🇺Russian word from crypter generator slip "line" 🤔 2⃣'UPX' Section -> Crypter (Obfuscate) 3⃣ Same "8 LAN" Argument for ARP/net local scanner Active🛡️ h/t

    Poništi
  21. proslijedio/la je Tweet

    Is this where I also go to file a complaint about my government trying to put dangerous back doors in the encryption of my mobile devices? 🧐

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·