kettelab

32 posts

kettelab

kettelab

@kettelab

Katılım Kasım 2020
660 Takip Edilen8 Takipçiler
Nana Sei Anyemedu
Nana Sei Anyemedu@RedHatPentester·
This is my student over here. Boss please I want you to charge me and teach me all you know in forensics. After just two days. Today this guy dey do wonders 🤍. I’m proud😂😂
Nana Sei Anyemedu tweet media
English
87
17
221
27.7K
Gunnar Andrews
Gunnar Andrews@G0LDEN_infosec·
If you are looking for this issue... **READ THIS** ⬇️... I already found multiple confirmed vulnerable assets with a custom template built the way @infosec_au and the @assetnote gang checks that the public PD template does NOT flag as vulnerable!
shubs@infosec_au

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…

English
2
13
99
12K
Debangshu 🇮🇳🥷
Debangshu 🇮🇳🥷@ThisIsDK999·
and the dupe party starts...
Dhiyaneshwaran@DhiyaneshDK

🚨 Scan for Adobe Commerce & Magento - XXE (CVE-2024-34102) discovered by Sergey Temnikov using Nuclei Template @pdnuclei 🔍 Details: github.com/spacewasp/publ… 📑 Nuclei Template: @dhiyaneshwaran/5SMcoU4iodifizkQHgDFL6" target="_blank" rel="nofollow noopener">cloud.projectdiscovery.io/@dhiyaneshwara… 🔧 GitHub PR: github.com/projectdiscove… #bugbounty #adobe #pdteam #infosec

English
1
0
13
1.9K
Coffin
Coffin@lostsec_·
Jenkins CVE-2024-23897 RCE Nuclei default templates dont gives any result so i just modified the templates with latest one..
Coffin tweet media
English
11
43
335
38.7K
kettelab retweetledi
Jack Halon
Jack Halon@jack_halon·
Today I am finally releasing a new 3-part browser exploitation series on Chrome! This was written to help beginners break into the browser exploitation field. Part 1 covers V8 internals such as objects, properties, and memory optimizations. Enjoy! jhalon.github.io/chrome-browser…
English
16
469
1.5K
0
kettelab retweetledi
mpgn
mpgn@mpgn_x64·
New CrackMapExec module to dump Microsoft Teams cookies thanks to @KuiilSec contribution✌️ You can use them to retrieve informations like users, messages, groups etc or send directly messages in Teams 🔥 Initial discovery by @NoUselessTech 🪂
mpgn tweet media
English
10
242
770
0
kettelab retweetledi
5pider
5pider@C5pider·
90% of my Twitter DMs are asking me about how to start getting into Malware development. Well, I love answering them but it's easier to write a small thread about it so here we go. 1/12
English
109
884
3.1K
0
kettelab retweetledi
Shayan Sardarizadeh
Shayan Sardarizadeh@Shayan86·
THREAD: How to check if a tweet screenshot is fake? Dozens of fake screnshots of tweets have gone viral in recently. So, here's a simple guide on how one can quickly check if a screenshot of a tweet attributed to an account is genuine or fake before falling for or sharing it.
Shayan Sardarizadeh tweet mediaShayan Sardarizadeh tweet mediaShayan Sardarizadeh tweet mediaShayan Sardarizadeh tweet media
English
101
3.7K
7.7K
0
kettelab retweetledi
0xPratyaksh
0xPratyaksh@mr_fr3qu3n533·
Working on few code review projects, I realised how important reviewing code regularly can be. IIt helps you connect the dots. Most importantly it let's you know, "Why a vulnerability occurs?". Below are few resources to get you started in code review🧵
English
5
27
64
0
kettelab retweetledi
Christiaan Triebert
Christiaan Triebert@trbrtc·
This 3D video by @Maxar shows the Russian military convoy northwest of Kyiv (not the entire 40-mile length, but gives a good impression). Note: this is from the previously Feb. 28 satellite imagery. It's been too cloudy for new satellite imagery updates.
English
10
79
163
0
Aleph א
Aleph א@no_itsmyturn·
Russian channels: "Vyshhorod, Kyiv oblast" #Ukraine 🇺🇦
Suomi
10
75
182
0
kettelab
kettelab@kettelab·
🥲
kettelab tweet media
QME
1
4
20
0