P0

131 posts

P0 banner
P0

P0

@Pzz02

Red Teamer. 🇮🇹 HTB/VL : P0

Katılım Ağustos 2020
335 Takip Edilen162 Takipçiler
P0 retweetledi
r0BIT
r0BIT@0xr0BIT·
There we go! Was a fun challenge :) @offsectraining thx again everyone for keeping my imposter syndrome under control. Especially @Pzz02 @xct_de @k0zmer and the entire @vulnlab_eu community. I’d be dogshit without you guys! <3
r0BIT tweet media
English
19
7
186
14.9K
P0 retweetledi
x86matthew
x86matthew@x86matthew·
WoWMIPS - A MIPS R4000 emulator which allows legacy Windows NT MIPS binaries to run on modern x86/64 Windows. A short series of articles describes the development of this emulator: x86matthew.com/view_post?id=m…
x86matthew tweet media
English
10
104
357
42.7K
P0 retweetledi
Andrea P
Andrea P@decoder_it·
My latest blog post diving into the world of Windows AD Cert Publishers group is out 🌐✨ Insights with a little bit of silver++ juice :-) decoder.cloud/2023/11/20/a-d…
English
3
68
180
27.1K
P0 retweetledi
Vulnlab
Vulnlab@vulnlab_eu·
A new Red Team Lab, Shiva, is coming to Vulnlab next week! This time you get to test a hardened Hybrid-AD environment that involves: - Hybrid-AD with 10+ machines & active users - Cloud exploitation - SIEM, EDR on Clients & Servers - Common enterprise software - No CVEs
Vulnlab tweet media
English
3
108
494
76.3K
P0 retweetledi
Martin
Martin@cantcomputer·
A red team operator that was just discovered by the SOC team
Martin tweet media
English
18
100
840
67.4K
P0 retweetledi
BlackWasp
BlackWasp@BlWasp_·
Here is my summary of the CoercedPotato exploit by @Prepouce_ and @Hack0ura , added to my Windows Potato family article : #bkmrk-coercedpotato" target="_blank" rel="nofollow noopener">hideandsec.sh/books/windows-…
English
0
36
96
9.1K
P0 retweetledi
Francesco Verardi
Francesco Verardi@frevadiscor·
📢 Just published a detailed writeup on a fascinating "Smart-Bank" CTF challenge! 🏦💻 Dived deep into vulnerabilities from Nginx misconfigurations to NestJS oversights. A real treasure for PTs and CTF enthusiasts! 🚀 🔗 @frevadiscor/rkOVSLVf6" target="_blank" rel="nofollow noopener">hackmd.io/@frevadiscor/r… @pwnx_official @nohatcon
English
0
2
10
869
P0 retweetledi
Elliot
Elliot@ElliotKillick·
Perfect DLL Hijacking: It's now possible with the latest in security research. Building on previous insights from @NetSPI, we reverse engineer the Windows library loader to disable the infamous Loader Lock and achieve ShellExecute straight from DllMain. 🔍 Link in bio 🔗
Elliot tweet media
English
14
291
805
119K
P0 retweetledi
LiveOverflow 🔴
LiveOverflow 🔴@LiveOverflow·
This is the best paragraph in the blogpost for the curl CVE-2023-38545 - I love the self-reflection. Huge respect to @bagder for his work on curl!
LiveOverflow 🔴 tweet media
English
5
81
670
68.1K
P0 retweetledi
A3h1nt
A3h1nt@A3h1nt·
For those of you who are finding #SharePoint Pre-Auth #RCE ( #CVE-2023-29357 + CVE-2023–24955 ) too technical to understand, here's a simplified version. 🧵(0/n)
English
4
77
264
64.3K
P0 retweetledi
kozmer
kozmer@k0zmer·
Push is a chain playable @vulnlab_eu made by myself and @xct_de, which focuses on initial access & exploiting common enterprise software. Walkthrough available here: blog.k0z.cc/blog/Push
English
3
11
43
4.2K