Pentester
2.95K subscribers
120 photos
3 videos
163 files
2.77K links
- Offensive Security (Red Teaming / PenTesting)
- BlueTeam (OperationSec, TreatHunting, DFIR)
- Reverse Engineering / Malware Analisys
- Web Security
Download Telegram
Use it to search for TLS certificates in the IPv4 space 🔍
https://t.co/YVeyCcM1El
Reminder for those asking me how to get started, this is one of the repos you will find a lot of info you need. It's overwhelming. Make a list of skills you want to learn and focus on one each. https://t.co/Dnhng9e4Kk

list of ctf sites on my site here:

https://t.co/9YboEtLmz2
POC, RemoteViewing, to demo RDP credential theft (adapted from @0x09AL post => https://t.co/sUhkZ7asOR) using EasyHook and Donut ☠️🖥️. More details on GitHub => https://t.co/bRXrFOR7Zu
Sn1per v7.4 Released! New exploits (shoutout @D0rkerDevil), virtual host scanning, several new OSINT checks, various fixes + more! https://t.co/Z4NUaXRieP
Open sourced legal documentation used for physical penetration tests.

The purpose is to help the community and organizations protect their employees when conducting testing.

Includes three docs:

MSA
SOW
Authorization Letter

https://t.co/Tco6WuuuaU
CVE-2019-12409: Apache Solr RCE vulnerability due to bad config default (JMX ) https://t.co/xQCOw10eD0

jython https://t.co/vkuiUeaCT2 xxx 18983 command super_secret "ls -la"

https://t.co/WkAdM31DMz
Introducing the fzero fuzzer! A target-architecture-agnostic grammar-based fuzzer (inspired by F1). With no input size constraints, multi-thread support, and all Rust code for no corruption bugs. 5x faster than the worlds fastest grammar-based fuzzer https://t.co/THfpliGou4
10 years ago @achillean launched the Shodan website! To celebrate a decade of discovery and growth we're going to offer the membership for $1 (marked down from $49) for the next 24 hours (0:00 UTC to 24:00 UTC): https://t.co/e6mRc8kQGt
Blog post on CVE-2019-2215, the Android binder bug that was exploited in-the-wild and affected most Android devices manufactured prior to Fall 2018.

https://t.co/guN9P0sXj4