Dev Unban

527 posts

Dev Unban banner
Dev Unban

Dev Unban

@devunbann

Here to provide Cyber Security services Gaming Account || Activision and All accounts unbanning/shadow bans|| NO FREE SERVICE❌,Message me on WhatsApp 👇

Katılım Mayıs 2009
71 Takip Edilen78 Takipçiler
Dev Unban retweetledi
Cybernews
Cybernews@Cybernews·
A critical vulnerability in cPanel and WHM, tracked as CVE-2026-41940, allows attackers to bypass authentication and gain full server access. Learn more: cnews.link/critical-cpane…
Cybernews tweet media
English
4
10
22
1.4K
Dev Unban retweetledi
OccupytheWeb
OccupytheWeb@three_cube·
When the grid goes down, you can remain connected. DeadMesh provides internet over LoRa, a mesh networking solution that functions when everything else fails. hackers-arise.com/off-grid-commu…
OccupytheWeb tweet media
English
1
34
150
7.1K
Dev Unban retweetledi
International Cyber Digest
International Cyber Digest@IntCyberDigest·
❗️🚨 Microsoft Edge keeps every saved password in process memory as cleartext from the moment it launches. Microsoft's responsed when reported: "by design." All of them. Including credentials for sites you won't open this session. Researcher @L1v1ng0ffTh3L4N tested every major Chromium browser. Edge is the only one that behaves this way. Chrome decrypts credentials on demand, and App-Bound Encryption locks the keys to an authenticated Chrome process so other processes can't reuse them. In Chrome, plaintext surfaces only during autofill or when a password is viewed, making memory scraping far less useful. What makes this extra weird is that Edge still demands re-authentication before revealing those passwords in its Password Manager UI, while the same browser process already holds every one of them in plaintext. In shared environments, this turns into a credential harvest. On a terminal server, an attacker with admin rights can read the memory of every logged-on user process. In the published PoC video, a compromised admin account lifts stored credentials from two other logged-on (and even disconnected) users with Edge running. Microsoft's official response when notified: "by design." The finding was disclosed April 29 at BigBiteOfTech by PaloAltoNtwks Norway, alongside a small educational tool that lets anyone verify the cleartext storage for themselves.
International Cyber Digest tweet mediaInternational Cyber Digest tweet media
English
227
2.2K
8.3K
1.2M
Dev Unban retweetledi
Co11ateral
Co11ateral@co11ateral·
During pentests we often have to deal with tasks that can be automated. Some of the best tools for this are ADScan and ADPulse. ADScan performs both enumeration and attack and is capable of analyzing BloodHound data to guide you through the pentest. It works with and without AD creds and can compromise some labs in just 3-5 minutes hackers-arise.com/offensive-secu… @three_cube @_aircorridor #pentesting #redteam
Co11ateral tweet media
English
0
50
311
18.4K
Dev Unban
Dev Unban@devunbann·
I protect🔒what matters most provides expert cybersecurity solutions, account unbanning/recovery and digital protection services to keep your data and business secured, Stay safe, Stay protected. WhatsApp 👇 wa.link/46uq3j #atviassist #twitchsupport #igotbanned
Dev Unban tweet mediaDev Unban tweet media
English
0
1
5
112
Dev Unban retweetledi
kritika
kritika@vibeonX69·
Linux users — which filesystem do you prefer most? • Btrfs • Ext4 • ZFS • XFS
kritika tweet media
English
145
12
246
15.4K
Dev Unban retweetledi
Security Trybe
Security Trybe@SecurityTrybe·
This really is one of the nicest things I've ever looked at.
Security Trybe tweet media
English
1
13
95
4K
Dev Unban retweetledi
Cyber Security News
Cyber Security News@The_Cyber_News·
🚨 Hackers Leverage Microsoft Teams to Breach Organizations Posing as IT Helpdesk Staff Source: cybersecuritynews.com/microsoft-team… A newly identified threat group, UNC6692, has been caught running a sophisticated multistage intrusion campaign that uses Microsoft Teams impersonation, a custom modular malware suite, and cloud infrastructure abuse to deeply penetrate enterprise networks, all without exploiting a single software vulnerability. The campaign abuses legitimate external collaboration features in Teams, with attackers convincing users to override multiple, clearly presented security warnings. Victims accepted the Teams chat invitation from an account outside their organization, a seemingly minor action with catastrophic consequences. #cybersecuritynews #teams
Cyber Security News tweet media
English
10
41
141
8K
Dev Unban retweetledi
Hacking Articles
Hacking Articles@hackinarticles·
🚨 Windows Privilege Escalation: Weak Services Permission 🔥 Telegram: t.me/hackinarticles ✴ Twitter: x.com/hackinarticles Weak Service Permissions occur when low-privileged users have excessive control over Windows services, allowing them to modify configurations or binaries and escalate privileges to SYSTEM. () 📘 Introduction to Windows Services ❓ What are Service Permissions & ACLs 📂 Service Control Manager (SCM) Access Rights ⚙️ Lab Setup (Vulnerable Service Creation) 🔍 Enumerating Services (wmic, sc qc) 🧪 Identifying Weak Permissions (Accesschk) 📟 Checking Service Configuration & Path 💣 Abusing SERVICE_CHANGE_CONFIG 📂 Modifying Service Binary Path 📥 Uploading Malicious Executable 🎯 Gaining NT AUTHORITY\SYSTEM Shell 🛠️ Exploiting Insecure Service Executable ⚡ Privilege Escalation using Metasploit ⚡ Misconfigured service permissions allow attackers to overwrite binaries or change service paths, leading to full system compromise with elevated privileges. 🔗 Read Full Guide: hackingarticles.in/windows-privil… #CyberSecurity #Pentesting #PrivilegeEscalation #Windows #EthicalHacking #Infosec
Hacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet mediaHacking Articles tweet media
English
1
9
60
3.3K