Uploaded all my Offensive Security & Reverse Engineering (OSRE) course labs (docx) to my repo found below. Most of them have very detailed instructions and should be great to get you started in Software Exploitation. 1/n
#Offsec#SoftwareExploitation#REexploitation.ashemery.com
Use silent #SMS messages to track LTE users’ locations
An attacker sends silent SMS messages with a defined pattern and analyze LTE traffic to verify the victim location.
All you need is just: SDR + SIM cards + LTESniffer software
mandomat.github.io/2023-09-21-loc…
Get stored Wi-Fi passwords with Android Rubber Ducky
I am grabbing stored Wi-Fi password from a Windows 10 machine using Android as #RubberDucky and sending it to webhook server
#Rucky#NetHunter#Windows
Testing ADB Exploitation-Framework for Android
The framework allows you to search and connect to #Android devices with open #ADB port (can't bypass authorization request) across the world
✅Make sure to have ADB disabled is you are not using it
github.com/0x1CA3/AdbNet#shodan
Bruteforcing PIN protection of popular app using $3 ATTINY85 #Arduino
Testing all possible PIN combinations (10,000) would take less than 1,5 hours without getting account locked. It is possible coz, PIN is limited only to 4 digits, without biometrics authentication
#rubberducky
I believe I just discovered a novel technique to get ChatGPT to create Ransomware, Keyloggers, and more.
This bypasses the "I'm sorry, I cannot assist" response completely for writing malicious applications.
More details in the thread.
The NSA has a free Ghidra debugging class if anyone is interested 👇
ghidra/GhidraDocs/GhidraClass/Debugger at master · NationalSecurityAgency/ghidra · GitHub github.com/NationalSecuri…
2 Followers 174 FollowingRecruiting webshell enginee rs to penetrate websites, with a monthly salary of up to $100,000. If interested, please contact https://t.co/diRGyreMQQ
22K Followers 0 FollowingAI-Powered Penetration Testing Assistant for offensive security testing, focused on web applications and network penetration testing.
3K Followers 2K FollowingMobile/IoT/Web security; Trainer & Speaker @BlackHat/DefCon/POC/OWASP/Hackfest...; Day job as Director of Security Engineering; #OSCE #OSCP #OSWE #CCISO...
482 Followers 92 FollowingTechnology enthusiast and mobile security researcher experienced in pentesting of mobile apps. Reach out at [email protected] for technical consultation.
4K Followers 1K FollowingHacker, security research architect for @Microsoft Defender.
Member of @thegooniesctf. Linux, Windows, Android, MacOS, iOS, ChromeOS, bare metal.
日本語オーケーです👌
51K Followers 186 FollowingThe Leading #Cybersecurity Professional Development Platform 🚀
If you have any questions, please contact our support team at
[email protected]! 💻
247K Followers 3K FollowingPentester, Forensic investigator, and former college professor. Trained hackers at every branch of US military and intelligence.
Visit me at https://t.co/G478wufszw
20K Followers 2K FollowingTechnical account for global cyber security & resilience provider, NCC Group. This account is run alongside the @NCCGroupplc corporate account.
20K Followers 8 FollowingReverse Engineering Framework for the commandline cowboys. Follow us in our primary fediverse for more updates https://t.co/aC9GtrVSVm
492 Followers 867 FollowingWe design offensive mobile security solutions for cybersecurity professionals. Creators of #Dexcalibur. @FrenchYeti, CEO and founder of Reversense, France.
212K Followers 3K FollowingSave your best highlights from Kindle, Twitter, Pocket, Instapaper, iBooks, and 30+ others.
Then revisit, search, organize, and export them seamlessly.
6K Followers 549 FollowingEntrepreneur - nullcon & https://t.co/qUPTyLxl7S Security Conference (tweets are personal & not affiliated to any entity/organization), Vintage 🍎Computer Collector
No recent Favorites. New Favorites will appear here.