Swissky

@pentest_swissky

CTF | Pentest | RedTeam, Author of PayloadsAllTheThings & SSRFmap

Paris, France
Vrijeme pridruživanja: kolovoz 2012.

Tweetovi

Blokirali ste korisnika/cu @pentest_swissky

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @pentest_swissky

  1. Prikvačeni tweet
    22. lip 2019.

    Ever wonder what to do with /graphql endpoint ? Use GraphQLmap :)

    Poništi
  2. proslijedio/la je Tweet
    prije 4 sata

    Bloodhound on an ultra wide curved monitor makes you feel like you’re hacking Hollywood Style.

    Poništi
  3. proslijedio/la je Tweet
    prije 23 sata
    Odgovor korisnicima

    Few lines of code to get CME with python3 🐰 git clone --recursive && cd CrackMapExec git checkout python3 git submodule update --recursive python3 install cme

    Poništi
  4. proslijedio/la je Tweet
    prije 7 sati

    1. Walk into office 2. Find unlocked laptop 3. Win+R cmd 4. net group "domain admins" myuser /DOMAIN /ADD 5. "The command completed successfully"

    Prikaži ovu nit
    Poništi
  5. proslijedio/la je Tweet
    4. velj

    x0rro — A PE/ELF/MachO Crypter for x86 and x86_64 Based on Radare2 Often AVs rely on simple signatures to detect malicious software and I needed a tool in order to confirm this behavior and be able to produce a working bypass. That’s why I wrote x0rro.

    Poništi
  6. proslijedio/la je Tweet
    4. velj

    I just published a blog post "Responsible Disclosure: Breaking out of a Sandboxed Editor to perform RCE"

    Poništi
  7. proslijedio/la je Tweet
    4. velj

    Had an awesome weekend playing with Team Exit on the , and also got around to finishing a write-up for the RMF / Ace of Diamonds challenge. Thanks for the challenges and good times, !

    Poništi
  8. proslijedio/la je Tweet
    17. sij

    I would love to share that. I developed a new feature of my TweetIOC app. If you wanna see, check it out. I summarize via cve by tweets that share IOC .

    Poništi
  9. proslijedio/la je Tweet
    3. velj

    I made a PowerShell script when researching COM objects that has like 30 foreach and if loops and will search every COM object method for a keyword, e.g. finding COM objects with a method containing 'ExecuteShell'. Maybe someone else will find it useful.

    Poništi
  10. proslijedio/la je Tweet
    22. sij

    Revisiting RDP lateral movement and releasing a project that will be part of a bigger tool coming next week

    Poništi
  11. proslijedio/la je Tweet
    30. sij
    Poništi
  12. proslijedio/la je Tweet
    2. velj

    I’ve just published my exploit for the LPE and RCE in OpenBSD’s OpenSMTPD recently disclosed by You can find it here:

    Poništi
  13. proslijedio/la je Tweet
    3. velj

    We are announcing our new blog with a post about Teamviewer and storing user passwords encrypted and not hashed allow for easy plaintext retrieval from the Windows registry.

    Poništi
  14. proslijedio/la je Tweet
    3. velj

    Getting Started with Icebox VMI: a step by step guide with some examples introducing Python bindings.

    Poništi
  15. proslijedio/la je Tweet
    2. velj

    How to create fake traffic jams in Google Maps with bucket full of smartphones Different perspective: 1) Buy mobile bots 2) Spoof GPS location 3) Control traffic

    Poništi
  16. proslijedio/la je Tweet
    2. velj

    I don't do illegal things just in case anyone else is thinking of DMing me. I will however demand all the roots.

    Poništi
  17. 2. velj
    Poništi
  18. proslijedio/la je Tweet
    2. velj

    I added a script to generate the PDF & archive for my Exam Report Template in Markdown, as I saw a lot of people where creating their own scripts.

    Poništi
  19. proslijedio/la je Tweet
    1. velj

    Load encrypted PE from XML Attribute. MSBuild is still the best.😅 MSBuild sets Property then calls Execute. Use this example to decouple payloads & prove that all security products have a "Single File Bias". Decouple payloads to subvert detection.

    Prikaži ovu nit
    Poništi
  20. proslijedio/la je Tweet
    22. sij

    Releasing an automated pipeline for bugbounty target reconnaissance today. Along with it are 6 blog posts detailing the build process / design. The github repo is tagged to correspond to blog posts. Enjoy! 🙃 repo:

    Poništi
  21. proslijedio/la je Tweet
    20. sij

    As promised, a short post on Hyper-V admin privesc: /cc

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·