Askar

@mohammadaskar2

I write codes that break codes, Hacker wannabe.

between lines
Vrijeme pridruživanja: srpanj 2011.

Tweetovi

Blokirali ste korisnika/cu @mohammadaskar2

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @mohammadaskar2

  1. Prikvačeni tweet
    10. pro 2019.

    Just wrote an article about , the tool that I presented at BlackHat London Arsenal 2019 I wish you will like the tool and stay tuned for more updates soon! Also I want to thank for the great opportunity!

    Poništi
  2. proslijedio/la je Tweet
    prije 8 sati

    Playing around with Octopus C2 from Greak work Askar!

    Poništi
  3. 5. velj

    Was working on a new update for Octopus with to deploy Cobalt Strike Beacon directly via Octopus agent, need more extra work to guarantee the stability and to make it more stealthy. I will push this update with the stable version soon!

    Poništi
  4. proslijedio/la je Tweet
    5. velj

    Win 10 search blank? Fix : [HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Search] "CortanaConsent"=dword:00000000 "BingSearchEnabled"=dword:00000000

    Poništi
  5. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  6. 3. velj

    Just discovered a new 0-day RCE in a well known network monitoring software, the code is well written which took me sometime to find the vulnerability. you can exploit it without authentication under some conditions. stay tuned for the full exploit code and a detailed article!

    Poništi
  7. proslijedio/la je Tweet
    2. velj

    The ultimate test of your knowledge is your capacity to convey it to another.

    Poništi
  8. proslijedio/la je Tweet
    1. velj

    Call for papers is open now until 1st March 2020. Please submit your talk's abstract to info@bsidesamman.org You can find the topics in the following link:

    Poništi
  9. proslijedio/la je Tweet
    31. sij

    Why is this so hard to understand? It’s not a 0day, the bug was disclosed in 2018 ffs

    Poništi
  10. 31. sij
    Poništi
  11. proslijedio/la je Tweet
    28. sij

    Kali 2020.1 is up for download! Big changes yet again, with non-root user by default, a single installer image for multiple desktop enviroments, updates to themes, and more! Not to mention Rootless NetHunter!

    Poništi
  12. 27. sij

    Spent the whole day trying to find RCE in a well known monitoring software, finished with couple of medium issues and a headache, but overall I had a lot of fun. Will back to it soon!

    Poništi
  13. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  14. proslijedio/la je Tweet
    22. sij

    Just dropped a new feature to , you can now generate payloads and perform HID attack to drop Octopus agent on windows machines You can know more about Octopus from this article stable version will be out soon!

    Poništi
  15. 22. sij

    Just dropped a new feature to , you can now generate payloads and perform HID attack to drop Octopus agent on windows machines You can know more about Octopus from this article stable version will be out soon!

    Poništi
  16. proslijedio/la je Tweet

    Confirmed! and used an info leak and a desierialization bug to get code execution w/ continuation on the Inductive Automation Ignition. They earn themselves $25,000 and 25 points towards Master of Pwn.

    Poništi
  17. 21. sij
    Prikaži ovu nit
    Poništi
  18. proslijedio/la je Tweet
    21. sij

    I just realized Desharialize, a tool to easily and dynamically exploit CVE-2019-0604 (SharePoint CVE). The reason to make it: - Use your own command (Public POCs contain hardcoded webshell commands - not clean for legit pentesting, or requires dotnet)

    Prikaži ovu nit
    Poništi
  19. 21. sij

    I just tried BadBlood by to generate random users, groups ,computers and set permissions too, it's a great choice if you want to fill your domain. Thanks David for the great tool.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    21. sij
    Odgovor korisniku/ci

    Solved already since Pandora FMS 7.0NG 742 update 😉

    Poništi
  21. proslijedio/la je Tweet
    19. sij
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·