Bilal

59 posts

Bilal

Bilal

@0xcc00

Writing buggy code

Katılım Temmuz 2021
287 Takip Edilen604 Takipçiler
Bilal
Bilal@0xcc00·
[Defeating Jiagu Android packer the wrong way] While testing an APK, i found that it was packed using Jiagu. This article serves as a quick documentation on how i unpack it the wrong way Article: @0xcc00/defeating-jiagu-android-packer-the-wrong-way-a288bf316441" target="_blank" rel="nofollow noopener">medium.com/@0xcc00/defeat…
Bilal tweet media
English
0
0
1
170
Bilal retweetledi
Amjad Masad
Amjad Masad@amasad·
Many are asking if they can move their Next.js projects from Vercel to Replit? Yes! - Go to Import then GitHub - enter repo URL - Agent will take care of the rest It will set up the dev and deployment environments! For companies moving lots of work, happy to help + discount.
English
350
2.2K
14.8K
3M
Miguel
Miguel@Gn0miez·
@0xcc00 hi, when writing the adaptixc2_mcp server. Why do you encode the BOF’s directly. I’m trying to implement something similar and kinda confused on why that vs trying to execute bof with the path?
English
1
0
0
136
Bilal
Bilal@0xcc00·
@Gn0miez You can also connect the client through burp, which what i did during the MCP development in order to extract the APIs rather than digging into the code
English
1
0
0
91
Bilal
Bilal@0xcc00·
@Gn0miez Hey, this is how they implemented the teamserver api, the code is mimicking the client, when the client send a custom bof it sends the binary also. As everything is stored and precompiled in the client side.
English
2
0
1
85
Bilal retweetledi
WikiLeaks
WikiLeaks@wikileaks·
Israel murders five journalists in targeted airstrike in Gaza. Al Jazeera journalists Anas al-Sharif and Mohammed Qreiqea, and camera operators Ibrahim Zaher, Mohammed Noufal, and Moamen Aliwa have been killed in a targeted Israeli airstrike. Two weeks ago, UN Special Rapporteur Irene Khan warned that Israeli threats and smear campaigns were “a blatant attempt to endanger [Al-Sharif’s] life and silence his reporting on the genocide in Gaza.” In July, the Committee to Protect Journalists said it was gravely concerned for his safety, warning he was being “targeted by an Israeli military smear campaign.” Shortly before the strike, al-Sharif posted to X: “Non-stop bombing...For two hours now, the Israeli aggression has been intensifying on Gaza City.” Well over 200 journalists and media workers have been killed in Gaza since October 2023.
WikiLeaks tweet media
English
754
6.6K
16.1K
630.8K
Bilal
Bilal@0xcc00·
@delete_exploits Its because you are accessing the front-end directly, what you need to do is accessing it via the reverse proxy (caddy) via https on port 443 In your case its https://localhost/internal
English
1
0
0
49
DELETE XPLOITS
DELETE XPLOITS@delete_exploits·
@0xcc00 Oh…thanks a lot… I’m actually testing locally…and I get this prompt…am I still doing something wrong
DELETE XPLOITS tweet media
English
1
0
0
56
Bilal
Bilal@0xcc00·
@delete_exploits Hey, its expected as you are browsing the “blocked page” any page you view is by default blocked unless you browse to the correct path, with you specified by -S option. For example: -S internal -> domain.com/internal
English
1
0
0
61
DELETE XPLOITS
DELETE XPLOITS@delete_exploits·
@0xcc00 Hello Bilal…I was trying phishyfish and after installing when i try to access the user_frontend I get this indefinite loading screen…any advice??
English
1
0
0
72
Bilal retweetledi
Ezra Woods
Ezra Woods@Shammahwoods·
@hardc1dr @al3x_n3ff @0xcc00 As Alex stated, it doesn't actually "read" the file in that way, but I do think this should be easy enough for vendors to build detections for based on raw disk reading alone. I tested this with a top 5 EDR and it did not alert, even with dumping the extracted files to disk..
English
0
1
3
223
Alex Neff
Alex Neff@al3x_n3ff·
Dumping the NTDS.dit from disk - A new NetExec module💾 Isn't it super annoying when AV blocks your access to the SAM/SYSTEM hives? The new "ntds_dump_raw" module made by @0xcc00 parses the disk image directly, allowing you to extract the NTDS.dit or SAM database🚀
Alex Neff tweet media
English
12
169
667
61K
Bilal retweetledi
‏Martyrs of Gaza
‏Martyrs of Gaza@GazaMartyrs·
“I want to eat because I haven’t eaten for five days” Don’t ignore her voice. she’s still hungry!
‏Martyrs of Gaza tweet media‏Martyrs of Gaza tweet media
English
277
5.2K
11K
183.4K
Bilal
Bilal@0xcc00·
@s3cdev Lets move it into DM
English
0
0
1
76
sh4hin
sh4hin@s3cdev·
@0xcc00 Thanks for the great work on this PoC. I’m facing an issue ,the command output isn’t showing in the Gemini console, and it can’t detect live beacons. Not sure if I’m missing something. Happy to continue here or via DM
English
1
0
0
91
Bilal
Bilal@0xcc00·
I've been playing with MCP, Releasing AdaptixC2_mcp a PoC that exposes Adaptix-C2 APIs to gemini-cli, enabling it to control a beacon and to simulate a threat actor behavior. Code: github.com/0xb11a1/Adapti…
English
1
2
19
1.2K
Bilal
Bilal@0xcc00·
@s3cdev Hey, what is it ?
English
1
0
0
108