Mohamed M.Fouad

524 posts

Mohamed M.Fouad banner
Mohamed M.Fouad

Mohamed M.Fouad

@Flash162011

Red Team Lead Consultant, OSEP, CRTP, OSWP, OSCP, GWAPT, CEH, MCT, MCTS, MCPD | Bug Bounty Hunter

0.0.0.0 Присоединился Mart 2011
936 Подписки727 Подписчики
Mohamed M.Fouad ретвитнул
Ian Carroll
Ian Carroll@iangcarroll·
In April, @samwcyo and I discovered a way to bypass airport security via SQL injection in a database of crewmembers. Unfortunately, DHS ghosted us after we disclosed the issue, and the TSA attempted to cover up what we found. Here is our writeup: ian.sh/tsa
English
51
628
2.2K
188.2K
Mohamed M.Fouad ретвитнул
1ue
1ue@1ue1166323·
[CVE-2024-21096] mysqldump rce : ) learn form defcon32
1ue tweet media
English
4
66
436
33.7K
Mohamed M.Fouad ретвитнул
Ebrahem Hegazy 🇵🇸
بضم صوتي لصوت أخي @Voulnet لو تعرف أي شركة اسرائيلية او بتدعم اسرائيل في مجال أمن المعلومات ياريت تكتبها وتعمل منشن لحساب محمد. زي ما بيبلغو عن الموظفين الداعمين لفلسطين لشركاتهم فا يلا بقي نقلبها بنفس نظام اللعب القذر
Mohammed Aldoub م.محمد الدوب@Voulnet

I'm collecting a list. Any company you find trying to pull its weight against us who oppose their narrative, send it to me. This game can be played both ways.

العربية
13
230
699
56.2K
Ahmed Sultan 🇪🇬🇵🇸
Passed Offsec Experienced Penetration Tester (OSEP) certification exam. Seems like Twitter has an issue with the new rex OS([CW][PE]|EP) ¯\_(ツ)_/¯
Ahmed Sultan 🇪🇬🇵🇸 tweet media
English
27
2
254
22.6K
Mohamed M.Fouad ретвитнул
an0n
an0n@an0n_r0·
Played with Outlook CVE-2023-23397. Made a simple PoC email builder & sender featuring malicious reminder (just a Msg, no need to use a Task or Cal. Ev.). Critical 0-click account takeover on internal networks even after MS patch, no need to open the message on the victim side.
an0n tweet mediaan0n tweet mediaan0n tweet media
English
15
354
1.1K
174.3K
Mohamed M.Fouad ретвитнул
TechCabal
TechCabal@TechCabal·
Liquid Intelligent Technologies has acquired a Cairo-based cloud and cyber security provider, Cysiv MEA in bid to boost its African presence. dlvr.it/SlDc5w
English
0
4
6
2.3K
Mohamed M.Fouad ретвитнул
mpgn
mpgn@mpgn_x64·
It's 2023, CrackMapExec can now dump DPAPI credentials as a core feature !🚀 This is possible thanks to the work of @_zblurx and his library dploot ! He also added a module to dump firefox passwords 🔥 Pushed on @porchetta_ind v5.4.5 Bruce Wayne 🪂 No excuse, DA everytime, 🔽
mpgn tweet media
English
16
303
988
121K
Mohamed M.Fouad ретвитнул
mpgn
mpgn@mpgn_x64·
Bloodhound python from @_dirkjan is now integrated to CrackMapExec as a core feature 🔥 ▶️ cme ldap <ip_dc> -u user -p pass --bloodhound Enjoy this one, more juicy features to come soon 💪 Pushed on @porchetta_ind thanks to the sponsors as always 🪂
mpgn tweet media
English
11
235
803
77K
Mohamed M.Fouad
Mohamed M.Fouad@Flash162011·
After FIN6 Adversary Simulation I did another Russians APT-28 (Fancy Bear) Adversary Simulation. From Initial Execution -> Persistence -> defense evasion -> credential access (Kerberoasting) -> lateral Movement -> Data Exfilteration. linkedin.com/posts/mohamed-…
English
0
0
1
139
Mohamed M.Fouad
Mohamed M.Fouad@Flash162011·
APT-28 (Fancy Bear) Adversary Simulation Progress... From Initial Execution -> Persistence -> defense evasion -> credential access (Kerberoasting) Still lateral movement and data exfiltration... #redteam #adversary #APT28
Mohamed M.Fouad tweet media
English
0
0
3
517
Mohamed M.Fouad ретвитнул
Noy Pearl
Noy Pearl@NoyPearl·
Woah the new versions of jadx allow you to generate pure @fridadotre snippets from Java functions. Pretty useful when RE Android apps. Here's an example of what it generates: #BugBounty tip
Noy Pearl tweet mediaNoy Pearl tweet media
English
1
24
108
17.5K
Mohamed M.Fouad ретвитнул
HTTPie
HTTPie@httpie·
🪄 Introducing HTTPie AI, a new way to interact with APIs 👉 httpie.ai
English
59
602
4.2K
710.6K
Lemon
Lemon@Lemonitup·
@Flash162011 Which platform is this? I can’t find anything about it on google.
English
1
0
0
19