Jerold Camacho

1.6K posts

Jerold Camacho

Jerold Camacho

@jeroldcamacho

Primarily focused on pentesting, mostly in web and network security, but I'm currently interested in automotive and hardware security right now.

Philippines Katılım Aralık 2013
581 Takip Edilen1.1K Takipçiler
Jerold Camacho retweetledi
spaceraccoon | Eugene Lim
spaceraccoon | Eugene Lim@spaceraccoon·
I found a remote code execution on the latest TP-Link Tapo webcam models! The path to code execution wasn't direct and involved an interesting chain (3 CVEs). Check out my blogpost for more details! spaceraccoon.dev/getting-shell-…
English
9
91
511
28.4K
vx-underground
vx-underground@vxunderground·
Big giveaway. - (x3) Certified Red Team Expert (CRTE) - (x3) Certified by Altered Security Red Team Professional for Azure (CARTP) - (x10) Malware Analysis for Hedgehogs Bundle CTRE and CARTP sponsored by @nikhil_mitt Malware Analysis sponsored by @struppigel Leave a comment below on what you'd like. Winners chosen in 24 hours.
vx-underground tweet media
English
1.7K
127
1.5K
111.1K
vx-underground
vx-underground@vxunderground·
Hello. I have partnered with @cyberwarfarelab to give away FOUR HUNDRED (400) vouchers to their Infinity Learning Pro Plan. This is worth $119,600. - 130+ hands-on labs, including advanced attack chains - Unlimited challenge time - Monthly new challenges & scenario updates - Leaderboards for nerds - ??? This is a massive giveaway. How to enter: 1. You NEED a Gmail account. IF YOU ARE SELECTED AS A WINNER authentication is performed via Gmail. It does NOT have to be your real Gmail. It can be a disposable email. However, if you DO NOT have a Gmail you WILL NOT be able to authenticate. 2. This is a pit of doom. You're all fighting. Leave a comment below with an IMAGE of your SILLIEST weapon of choice. 3. This giveaway will be active for the next 48 hours (unless I get bored). It is November 30th, 2025. If you comment AFTER December 2nd, 2025 then you're a big stinky nerd. You have missed the pit of doom. 4. Winners will notified by me commenting your comment. If you do not respond to the DM within 24 hours (if you're selected) you forfeit your win and someone else is chosen. PAY ATTENTION. Good luck in the pit of doom. Have fun. I expect lots of laughs from the silliness. Cheers,
English
1.2K
102
1.4K
119.4K
vx-underground
vx-underground@vxunderground·
Giveaway time. Our friends at @cyberwarfarelab have gifted us AIO (All In One) Access to ALL of their courses for TWO PEOPLE You'll have access to the following courses (including labs). It is a lot. You're not expected to complete everything. This is valued at over $11,000. If you're gifted this you're expected to actually do something and not be a bum. This is a life changing giveaway. If you win this giveaway, bucked up, and lock in, you could be big brain real fast. Don't squander this. How to enter: - Leave a comment - ??? - I like cats Red Teaming: - Web Red Team Analyst [Web-RTA] - Active Directory Red Team Specialist [AD-RTS] - Enterprise Lateral Movement Specialist [CELMS] - Red Team Analyst [CRTA] - Red Team Specialist [CRTS V2] - Red Team Infra Dev [CRT-ID] - Stealth Cyber Operator [CSCO] Blue Teaming: - Blue Team Fundamentals [BTF] - Cyber Defence Analyst [CCDA] Purple Teaming: - Purple Teaming Fundamentals-C-Edition - Process Injection Analyst [CPIA] - Purple Team Analyst [CPTA V2] Cloud Security: - Multi-Cloud Red Team Analyst [MCRTA] - Hybrid Multi-Cloud Red Team Specialist [CHMRTS] - Google Cloud Red Team Specialist [CGRTS] - AWS Cloud Red Team Specialist [CARTS] - Multi-Cloud Blue Team Analyst [MCBTA] Ethical Hacking (Introduction courses): - Cyber Security Analyst [C3SA] - Certified Cyber Security Engineer [CCSE] Evasion & Exploitation: - Red Team – CredOps Infiltrator [CRT-COI] - Enterprise Sec. Controls Attack Specialist [CESC-AS] - Windows Internals Red Team Operator [CWI-RTO] - Certified Exploit Development Professional [CEDP] DevOps: - Certified DevOps Red Team Analyst (DO-RTA) Kubernetes Security: - K8s Red Team Analyst (K8s-RTA)
English
936
138
1.2K
73.7K
Jerold Camacho retweetledi
Alex Plaskett
Alex Plaskett@alexjplaskett·
Breaking Into a Brother (MFC-J1010DW): Three Security Flaws in a Seemingly Innocent Printer by Nguyên Đăng Nguyên & Manzel Seet & Amos Ng starlabs.sg/blog/2025/11-b…
Alex Plaskett tweet mediaAlex Plaskett tweet mediaAlex Plaskett tweet media
Română
0
7
36
2.6K
Altered Security
Altered Security@AlteredSecurity·
Black Friday Giveaway & Exclusive Discounts Win FREE access to: • 1 CRTE seat • 1 CETP seat How to participate: 1️⃣ Like this post 2️⃣ Comment which course you’re interested in and why 3️⃣ Repost Winners will be randomly selected and announced on December 2, 2025. Those who’ve already availed the Black Friday offer are still eligible! Black Friday Sale is LIVE: • Up to 25% OFF Red Team Labs & Bootcamps • Up to 15% OFF AltSecCON 2025 tickets Grab your offer today: alteredsecurity.com/online-labs #BlackFriday #Giveaway #RedTeam #CyberSecurity #CRTE #CETP #AlteredSecurity
Altered Security tweet media
English
254
227
437
27.8K
Jerold Camacho
Jerold Camacho@jeroldcamacho·
@AlteredSecurity CRTE because I already have the CRTP certification, and I want to continue learning about AD, better understand the threats, and practice attacks against modern Windows infrastructure.
English
0
0
0
70
Jerold Camacho retweetledi
Matt Brown
Matt Brown@nmatt0·
ALWAYS GET ASKED: How do I get started in IoT pentesting? My main suggestion: pick a cheap device, open it up, and explore. You can just hack stuff! I'm doing a FREE mini course on IoT pentesting basics. First up: device teardowns & debug interface hunting brownfinesecurity.com/blog/iot-pente…
English
1
8
23
2.1K
Jerold Camacho retweetledi
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
#SPIRITCYBER25 has come to a successful close!   👏 Big shoutout to everyone who participated and congrats to our Top 6 teams once again - your findings have helped advanced Singapore’s cyber resilience. 1️⃣ zamny zamn zamn: @elma_ios, @sunsh1nefact0ry, @junr0n 2️⃣ NullIoT: @bytehx343 @0xakm, @mgthura404 3️⃣ Obsidian Ghost Protocol: @spaceraccoon, Zhong Liang, Azer 4️⃣ Peenoise: @shipcod3, @jeroldcamacho, @japzdivino 5️⃣ saltedeggchicken: @Sn0rkY, Cher Boon Sim, @nbuzydebat  6️⃣ Testalways: @testalways
YesWeHack ⠵ tweet mediaYesWeHack ⠵ tweet mediaYesWeHack ⠵ tweet media
English
1
7
43
14.5K
Jerold Camacho retweetledi
YesWeHack ⠵
YesWeHack ⠵@yeswehack·
🇸🇬 Big week for @yeswehack at #SICW2025! The #SPIRITCYBER25 Hackathon will see 6 elite teams competing live on 22–23 Oct to strengthen Singapore’s critical #IoT systems. 🏆 From 30+ teams which participated in the 4-week qualifiers, these top hunters have earned their spot in the finals: 🔹zamny zamn zamn: @elma_ios, @sunsh1nefact0ry, @junr0n 🔹Obsidian Ghost Protocol: @spaceraccoon, Zhong Liang Ou-Yang, Azer WHR 🔹Peenoise: @shipcod3, @jeroldcamacho, @japzdivino 🔹Testalways: @testalways 🔹NullIoT: @bytehx343 @0xakm, @mgthura404 🔹saltedeggchicken: @Sn0rkY, Cher Boon Sim, @nbuzydebat
YesWeHack ⠵ tweet media
English
1
9
34
10K
Jerold Camacho retweetledi
r1ru
r1ru@ri5255·
I have released the first half of "Binary Exploitation 101", a beginner-friendly guide to binary exploitation. You can learn from classic buffer overflow to ret2dlresolve through CTF-like challenges. I am working on the second half now. Stay tuned🔥 r1ru.github.io/categories/bin…
r1ru tweet mediar1ru tweet media
English
13
307
1.4K
61.7K
Jerold Camacho retweetledi
CODE WHITE GmbH
CODE WHITE GmbH@codewhitesec·
We have reproduced "ToolShell", the unauthenticated exploit chain for CVE-2025-49706 + CVE-2025-49704 used by @_l0gg to pop SharePoint at #Pwn2Own Berlin 2025, it's really just one request! Kudos to @mwulftange
CODE WHITE GmbH tweet media
English
8
163
643
109.7K