Pentester
2.94K subscribers
120 photos
3 videos
163 files
2.77K links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
PHP deserialization techniques DRUPAL 1-CLICK TO RCE EXPLOIT CHAIN DETAILED

/sites/default/files/pictures/<YYYY-MM>/_0
instead of:
/sites/default/files/pictures/<YYYY-MM>/profile_pic.gif.

[Demo] https://t.co/ZkHof6sDzy
https://t.co/etmxwSWEBD
Invisi-Shell : Hide your Powershell script in plain sight (Bypass all Powershell security features) : https://t.co/Zsy5Bp4tJH

Presentation : Goodbye Obfuscation - Hello InvisiShell Hiding Your Powershell Script in Plain Sight : https://t.co/awYN09bcVE
This repository contains all the noise and artifacts surrounding the development of a new implementation of #Meterpreter that is intended to run on the CLR.

https://t.co/8qKOnis9N7
Building an Office macro to spoof parent processes and command line arguments - Christophe Tafani-Dereeper
https://blog.christophetd.fr/building-an-office-macro-to-spoof-process-parent-and-command-line/
Your nmap http scripts returning nothing? Might be because there's a block on nmap's default user agent. Either correct by modifying http.lua or use a script arg.

https://t.co/tvGiSmmGAc
https://t.co/g0K3L4CPwH

Here's my nmap alias: https://t.co/WtLBfp3Tm2