Thanasis(trickster0)

@trickster012

OSEE, OSCP, OSCE .Penetration Tester, Vulnerability Researcher, Bug Bounty Hunter, IT Security

Vrijeme pridruživanja: studeni 2016.

Tweetovi

Blokirali ste korisnika/cu @trickster012

Jeste li sigurni da želite vidjeti te tweetove? Time nećete deblokirati korisnika/cu @trickster012

  1. Poništi
  2. proslijedio/la je Tweet
    27. ruj 2019.

    Giving away one of my absolute favorite pieces of swag. I only have one, have never used it, and want to share the love from 💕 XLGames 💕 with a lucky friend. Like/Retweet/Follow to be considered! I'll roll randomly on Oct 4th at 1pm PDT. Thanks and GL!

    Prikaži ovu nit
    Poništi
  3. proslijedio/la je Tweet
    19. ruj 2019.

    Congratulations for solving the BFS challenge! The winners In order of submission: 1. 2. 3. 4. 5. 6. 7. 8. 9.

    Poništi
  4. Amazing site to check the hex number of the syscalls in multiple different architectures :)

    Poništi
  5. Poništi
  6. proslijedio/la je Tweet
    6. ruj 2019.

    We just released Cutter v1.9 on with a HUGE surprise - a full integration of Ghidra decompiler in Cutter! 🥳 Download v1.9 with the Decompiler from For more info, keep reading >>

    Prikaži ovu nit
    Poništi
  7. proslijedio/la je Tweet
    30. kol 2019.

    Telspace Systems Security Advisory (TSA-2019-001) - Asus Precision TouchPad 11.0.0.25 (Pool Overflow), CVE-2019-10709. POC and more info at

    Poništi
  8. New Tool,made in rust by resources gathered for a cobalt EDR cna. This will let you know what kind of endpoint security solution might be used in a host according to drivers in the system. If you know more driver names, let me know so i can add them :)

    Poništi
  9. I made a new small implant, quite similar to CIA's Hive. Take a look :) Mostly done to get better in Rust

    Poništi
  10. My new Linux Enum tool, maybe not the best out there but it has some unique ideas and searches. Mostly done to learn better Rust.

    Poništi
  11. Poništi
  12. Is there something like burp's interceptor but for winapi calls???

    Poništi
  13. Quite prouf of this one :) Still lots to learn...

    Poništi
  14. proslijedio/la je Tweet
    5. ožu 2019.

    comes with some great documentation, slides & exercises as well for beginner, intermediate and advanced users. Thanks and the entire team behind Ghidra . Really nice work! ghidra_9.0 > docs > GhidraClass

    Poništi
  15. Anyone aware of a company hiring security researchers/exploit devs in EU without the need of SC or DV Clearance?

    Poništi
  16. CERTIFIED! Coolest exam i have ever done :D

    Poništi
  17. proslijedio/la je Tweet
    10. velj 2019.

    Any rumors of me dropping 0days in training courses are entirely founded and wholly noninaccurate.

    Poništi
  18. Course has began! Great 1st day today!

    Poništi
  19. :D My first bug bounty subdomain takeover vuln found

    Poništi
  20. 1. sij 2017.

    A gift from Xiaomi , cause of a bug I found. A phone stand , it is funny :p

    Poništi

Čini se da učitavanje traje već neko vrijeme.

Twitter je možda preopterećen ili ima kratkotrajnih poteškoća u radu. Pokušajte ponovno ili potražite dodatne informacije u odjeljku Status Twittera.

    Možda bi vam se svidjelo i ovo:

    ·