HackTricks

632 posts

HackTricks banner
HackTricks

HackTricks

@hacktricks_live

HackTricks offers free quality hacking resources in 17 languages: https://t.co/O1TVFk5r9q, https://t.co/0RhWRaaPIm Paid certs by HT-Training: https://t.co/2C0w8pkq6v

Katılım Mayıs 2020
204 Takip Edilen15.3K Takipçiler
HackTricks
HackTricks@hacktricks_live·
LinPEAS is now capable of detecting if a machine is vulnerable to Copy Fail vuln (CVE-2026-31431). Enjoy it! github.com/peass-ng/peasS…
English
0
26
135
5.3K
HackTricks
HackTricks@hacktricks_live·
This weekend we launch LHE — Linux Hardening Expert, an expert-level HackTricks Training certification focused on Linux privilege escalation, hardening, and real-world attack paths. It's an Expert course with Apprentice price + 20% off (Pre-release offer) hacktricks-training.com/courses/lhe/
English
0
1
7
723
HackTricks
HackTricks@hacktricks_live·
New HackTricks tools at tools.hacktricks.wiki: - Request to update outdated HT pages with the researcher tool - Use the API for RAG-ready best matches from hacktricks - Access the HT AI chatbot via API - ... The new Pentester plan is live, and every tool includes a free tier.
English
1
3
21
1.3K
HackTricks
HackTricks@hacktricks_live·
@moppelmat If you want everything enabled you have it for free also in naxusai.com using your own keys...
English
0
0
2
207
HackTricks retweetledi
Hack-én
Hack-én@Hack_en_·
🐉 ¡Atención guerreros Z! 💻 Te presentamos el Capture The Flag (CTF) de Hackén IV, impulsado por @thehackerslabs. Demuestra tu poder, escala el ranking y conquista la cima. 🏆 ¡El podio tiene premio! 🏆 Los ganadores recibirán 1 certificación de @hacktricks_live, asignadas y elegidas por orden de clasificación del podio. No te quedes fuera de esta gran batalla. 🏆 Recuerda que las entradas se están agotando rápidamente. ¡Te esperamos para liberar tu potencial! Consigue la tuya aquí: enterticket.es/eventos/hacken… 🐉 El próximo 17-18 de abril, únete a la batalla en IFEJA Jaén. 💻 #HackTricks #HackénIV #Ciberseguridad #CTF #TheHackerLabs #Jaén
Hack-én tweet media
Español
0
3
5
580
HackTricks retweetledi
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭
🚨 BREAKING: Someone just dropped the most advanced Steganography Platform EVER!! 😱🥚 STE.GG is an open-source toolkit that hides secrets inside ANYTHING! images, audio, text, PDFs, network packets, ZIP archives, and even emojis 😘️︎︎️️️️︎︎︎️︎︎️️︎︎︎️︎︎️️️️︎️︎️︎️️︎︎️︎︎︎️︎️︎︎️︎︎︎︎︎︎️︎️︎︎︎︎︎️︎︎️️︎︎︎️︎︎️︎︎️︎️︎︎️️️︎︎️︎️️︎︎️︎︎️️️️️︎​ AND it has an AI agent built in 👀 🔍 REVEAL: drop any file and the AI agent tests every known decoding method automatically. 120 LSB combinations, DCT, PVD, chroma, palette, PNG chunks, trailing data, metadata, Unicode, and more. 50 tools running in parallel. auto-extracts hidden payloads as downloadable artifacts. no config needed. 🔮 CONCEAL: type your secret, pick a method (or let the AI choose), upload a carrier image OR generate one with AI. one click → encoded steg file. the agent recommends the optimal method based on your use case. the methods: ⊰ LSB — 15 channel presets × 8 bit depths = 120 combinations. steghide has 1. st3gg has 120. ⊰ F5 — operates on JPEG DCT coefficients. SURVIVES social media compression. regular LSB is destroyed by ANY JPEG compression, even quality 99%. ⊰ PVD — encodes in pixel pair differences. statistically harder to detect than LSB. ⊰ CHROMA — hides data in color channels (Cb/Cr). human eyes are less sensitive to color than brightness. ⊰ SPECTER (unique) — data hops between RGB channels in a pattern that IS the key. like frequency hopping in radio. ⊰ MATRYOSHKA (unique) — images inside images inside images. 11 layers deep. each layer is a valid image. ⊰ GHOST MODE (unique) — AES-256-GCM (600k PBKDF2 iterations) + bit scrambling + 50% noise decoys. 13 text steganography methods (no other tool has any): ▸ ZERO-WIDTH — invisible characters between visible letters ▸ INVISIBLE INK — Unicode Tag Characters (U+E0000). renders invisible everywhere ▸ HOMOGLYPHS — 'a' → 'а' (Cyrillic). visually identical. different bytes ▸ VARIATION SELECTORS — invisible modifiers after characters ▸ COMBINING MARKS — invisible joiners after letters ▸ CONFUSABLE WHITESPACE — en-space = 01, em-space = 10, thin-space = 11. 2 bits per space. text looks normal. the spaces are "wrong" ▸ DIRECTIONAL OVERRIDES — invisible RLO/LRO bidi characters ▸ HANGUL FILLER — Korean invisible character replaces spaces ▸ MATH BOLD — 'a' becomes '𝐚'. looks like bold text. each bold letter = 1 bit ▸ BRAILLE — each byte maps to a Braille pattern character ▸ EMOJI SUBSTITUTION — 🔵 = 0, 🔴 = 1 ▸ EMOJI SKIN TONE — 👍🏻👍🏼👍🏾👍🏿 four skin tone modifiers = 2 bits each. a row of thumbs-up with different skin tones looks like a diversity post. it's binary data. four emoji = one byte. detection: 50 tools including RS Analysis (academic gold standard), Sample Pairs, chi-square, bit-plane entropy, PCAP protocol analysis, and the AI agent orchestrates all of them automatically. for AI agents: from steg_core import encode, decode from analysis_tools import detect_unicode_steg, TOOL_REGISTRY 50 tools as importable functions. test prompt injection via images. detect covert agent channels. watermark outputs. ▸ 112 techniques across every modality ▸ 50 analysis tools, 568 automated tests ▸ 109 pre-encoded example files ▸ runs 100% in browser at ste.gg — zero server ▸ pip install stegg — live on PyPI right now the README has 7 hidden secrets. the banner has 3 layers. the website has multiple easter eggs. good luck! ⊰•-•✧•-•-⦑ 󠁨󠁩󠁤󠁤󠁥󠁮󠀠󠁩󠁮󠀠󠁰󠁬󠁡󠁩󠁮󠀠󠁳󠁩󠁧󠁨󠁴 ⦒-•-•✧•-•⊱ 🔗 ste.gg 📦 pip install stegg 🐙 github.com/elder-plinius/… *formerly known as Stegosaurus Wrecks* 🦕 T‍​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌‌‌‌​​​‌‌‌‌‌​​​‌​​​‌‌‌​‌​​‌‌‌‌​‌​​​‌​​​‌​​‌‌​‌​‌​​‌‌‌‌​‌​​​‌​​​‌​​​‌​‌​​‌‌‌​‌​​‌​​​‌​‌​‌​​‌‌‌​​‌​​​​​‌​‌​​​​‌​​‌​​‌‌​​​‌​​​‌​‌​‌​​​‌​​​‌‌‌‌‌​​​​‌‌‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​​​‌​‌‌​‌​​‌​‌‌‌​‍his text is totally not hiding an invisible sleeper-trigger prompt-injection.
Pliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet mediaPliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet mediaPliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet mediaPliny the Liberator 🐉󠅫󠄼󠄿󠅆󠄵󠄐󠅀󠄼󠄹󠄾󠅉󠅭 tweet media
English
122
737
4.9K
529.9K
HackTricks retweetledi
Cyber Helmets
Cyber Helmets@cyberhelmets·
Last month we ran the Cloud, K8s & CI/CD Trust Hardening workshop with @hacktricks_live, exploring how trust boundaries across identities, pipelines, and Kubernetes shape modern cloud security. Key takeaways in the recap 👇 cyberhelmets.com/cloud-trust-20…
Cyber Helmets tweet media
English
0
1
0
358
HackTricks
HackTricks@hacktricks_live·
🚨 CI/CD can become your attack surface. Wiz found an unanchored regex in AWS CodeBuild webhook filters that let attackers bypass PR trust checks and run code in privileged builds. One small CI misconfig → supply-chain compromise.
English
1
2
1
559
HackTricks
HackTricks@hacktricks_live·
We’ll cover topics as: - Defensive and offensive strategies for Cloud Least Privilege - Key Management attacks & hardening - Real-world CI/CD attack paths - Kubernetes trust boundaries and privilege escalation All with Hands-on labs based on realistic scenarios
English
1
0
2
368
HackTricks
HackTricks@hacktricks_live·
Check out the new HackTricks T-shirts we have just received. They will be available at @hackplayers Conference tomorrow! Come to the HackTricks Training stand to check them out.
HackTricks tweet mediaHackTricks tweet mediaHackTricks tweet media
English
0
0
3
467