Syed Umar Arfeen

@syed__umar

UGVuZXRyYXRpb24gVGVzdGVyIGFuZCBhIFByb2dyYW1tZXIgOikgICAgICAgICAKR290IE9TQ1Ah CgpHaXRodWIgfiBBbm9uLUV4cGxvaXRlcgpBbHNvLCB3aHkgeW91IHN0YWxraW4gbWUgYnJ1aCE/ Cg==

Vrijeme pridruživanja: listopad 2017.

Tweetovi

Blokirali ste korisnika/cu @syed__umar

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @syed__umar

  1. Prikvačeni tweet
    29. stu 2019.

    Achieved one of the biggest goals of my life! Did OSCP! Thanks, for such awesome labs and exam. Hoping to do OSCE before I turn 19 :)

    Prikaži ovu nit
    Poništi
  2. proslijedio/la je Tweet
    1. velj

    I was wondering why this guy shine 💫so much? "beautiful people don't come out of nowhere" Totally recommended this interview, specially if you are struggling with mental/emotional issues This is amazing 👏🌈💕 Thank you!

    Poništi
  3. proslijedio/la je Tweet
    29. sij

    Last year and I created Tempus Fugit 1, which is available on Anyway, if you've tried it, but didn't have much luck getting that initial foothold, today might be your lucky* day.

    Prikaži ovu nit
    Poništi
  4. proslijedio/la je Tweet
    24. sij
    Poništi
  5. proslijedio/la je Tweet
    22. sij

    if you find 403 Forbidden while testing. Try X-Original-URL and X-Rewrite-URL Headers to bypass restrictions

    Poništi
  6. proslijedio/la je Tweet
    23. velj 2019.

    To test XSS + SQLi + SSTI/CSTI with the same payload use : '"><svg/onload=prompt(5);>{{7*7}} ' ==> for Sql injection "><svg/onload=prompt(5);> ==> for XSS {{7*7}} ==> for SSTI/CSTI by me !

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet

    Cyberwar explained

    Poništi
  8. proslijedio/la je Tweet
    22. sij

    What is the best way to scare off black hat hackers? 🎩😱

    Poništi
  9. proslijedio/la je Tweet
    16. sij

    Yesterday at the meetup I also showed a new pentesting template I have been working on that includes my tools and tricks I have used for OSCP and in actual assessments. This template is an update to what created in cherry tree but instead the tool I used is Joplin.

    Poništi
  10. proslijedio/la je Tweet
    10. sij

    Yo hackers! I've built a small website that has some challenges. 🔗 The main challenge for the week is `WW3` All upcoming challenges will be hosted there, so stay tuned :) Would love to know what you guys think. Have fun!

    Poništi
  11. proslijedio/la je Tweet
    5. lis 2019.

    Fingerprint detailed Windows version, gather exact server time, check if SMB signing and IPC$ null sessions are enabled, and finally if RDP is open for all machines on a class C network takes ./Runfinger.py ~2,5 seconds :)

    Poništi
  12. proslijedio/la je Tweet
    30. lis 2019.

    Python2 is about to die; Responder was written 8 years ago. Netbios & LLMNR are still enabled by default on latest Windows versions. We'll surely make Responder python 2&3 compliant, if MSFT still facilitate easy internal network compromises, we won't let you down either ;)

    Poništi
  13. proslijedio/la je Tweet
    9. sij

    Responder 3.0.0.0 is out! Massive upgrade, support for both py3 and py2, many bug fix, enhancements and Q.A++ on all servers, poisoners and tools. Enjoy! ;)

    Poništi
  14. proslijedio/la je Tweet
    8. sij

    Hi guys, I've created a repository on Github for my OSCE prep. I included 25 exploits and fuzzing scripts for most of them. Hope you find them useful. May the force be with you! (Exam is coming...) 🤓👩🏼‍💻

    Ovo je potencijalno osjetljiv multimedijski sadržaj. Saznajte više
    Poništi
  15. proslijedio/la je Tweet
    8. sij

    Not sure if this is the beginning of a series, or the end of a series shortly after it's just begun. ;-) Anyway, this is just for my Twitter followers for the time being: Let me know what you think. :-)

    Poništi
  16. proslijedio/la je Tweet
    7. sij

    Infosec professionals rejoice... We’re proud to announce our exclusive partnership with Offensive Security to bring you a new line of Kali and OffSec branded merchandise!

    Poništi
  17. proslijedio/la je Tweet
    6. sij

    thanks for your vulnhub machine

    Poništi
  18. proslijedio/la je Tweet
    5. sij

    Possible fix I just found (this person's "auto" also sets to 144p ?!?!)

    Poništi
  19. proslijedio/la je Tweet
    23. pro 2019.

    IT'S HERE! My Udemy course is now live. Thank you to everyone who supported the projected and kept me motivated. 190 videos, 24.5 hours of hacking. See attached syllabus for more info. Please use code THECYBERMENTOR at discount for a 90% discount.

    Prikaži ovu nit
    Poništi
  20. 1. sij

    if possible, could you please add DC-9 on . I can send an email if hasn't already. Here's the description of the machine:

    Prikaži ovu nit
    Poništi
  21. 1. sij

    Yet again, an awesome machine by . It's sad, that it'll be the last machine of your series, man, I really loved it! In the end, I just wanna say I was highly inspired to start doing Vulnhub machines from DC-1. Thanks for the hard-work man! <3

    Prikaži ovu nit
    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·