Phenomenal
@Chawla12111
Followers
113
Following
6K
Media
7
Statuses
2K
Give me a few years, I've got some big plans
Joined July 2019
I just published My Experience of Hacking The Dutch Government. @zseano following your Nahamcon video I decided to hunt on the Dutch government and after 5 months finally found a valid vulnerability. Thank you @remonsec for your writeups and recon posts.
link.medium.com
Hi Everyone! ,
13
26
119
Congratulations to @Chawla12111 for clearing our Certified Red Team Expert exam! #RedTeamLab #CRTE #AlteredSecurity cc @nikhil_mitt
https://t.co/WXT4d36ugS
https://t.co/2jmkyepVbi
0
1
8
I'm a hacker and AI researcher who has reported vulnerabilities to OpenAI, Google, and others. I wrote this guide as a reference of all of the ways that you can hack AI. It has saved me hours. Bookmark this if you need a reference for what all to try (AND includes mitigations).
72
743
4K
⚠️ Giveaway time! ⚠️ 👇 📢 Our new course "Attacking AI" will be Feb 27-28! This two-day course equips security professionals with the tools and methodologies to identify vulnerabilities in AI systems. It's gonna be a BANGER. Syllabus: https://t.co/ypRfeyDniu We are giving
payhip.com
269
311
551
List of EDR Bypass Resources
github.com
Awesome EDR Bypass Resources For Ethical Hacking. Contribute to tkmru/awesome-edr-bypass development by creating an account on GitHub.
1
69
294
Finally done with the CRTL, Learned a lot of stuff. This one surely worth it. Lab and Exam was full of highs and lows. Thanks @_RastaMouse and @zeropointsecltd for the awesome course content, lab and exam. https://t.co/PZdaOYskAu Link to CRTL notes below
3
15
157
GIVEAWAY of my Offensive Rust course to 5 people who like and retweet this tweet. More giveaways are coming soon. Winner will be picked on 29th this month https://t.co/1X5aHEekcL
#infosec #cybersecurity #hacking #rust
udemy.com
Learn Redteaming the rusty way
14
138
216
I and @rootxharsh found and exploited a 0Day RCE in Apple's Travel Portal and were rewarded with $50K. Here's the write-up for that: https://t.co/zMpw2QOEvP
84
814
3K
When Pentest Tools Go Brutal (brute-ratel-c4-tool). Man What a clever idea. Didn't expect that move ! https://t.co/l3nYWcBJEY
#analysis #maldev #tools
unit42.paloaltonetworks.com
Pentest and adversary emulation tool Brute Ratel C4 is effective at defeating modern detection capabilities – and malicious actors have begun to adopt it.
1
36
139
My maldev works and practices [Oct 2024]: + Remote Process Injection using NTAPI: https://t.co/X3s8eYIXUr + Code injection using (NtCreateSection,NtMapViewOfSection) : https://t.co/CbpxC7NkvK + Payload Shuffling Technique: https://t.co/mA32QeAcDD + Local Mapping Injection:
7
144
524
🔗In this article we talk about how I exploited a Fortune 500 Through Hidden Supply Chain Links Link 👇 https://t.co/K5vo4M1Rap Thanks to the entire @HashiCorp team ! 🤟 Enjoy 🔥
9
79
305
Malware Analysis series by @cocomelonckz Part 1 : https://t.co/TcqpdAKlGu Part 2 : https://t.co/GKGYEpCjke Part 3 : https://t.co/quu8p70TKW Part 4 : https://t.co/heeVRZyRTe Part 6 : https://t.co/mEJwYAnb9f Part 7 : https://t.co/Mqeb9keUlD Part 8 : https://t.co/zjAX2q6VZL
6
273
938
Malware development essential Notes. Become an basic to intermediate Maldev. I have covered about Windows Architecture, Memory Access Permissions , winapi's , Page Protections and more ... Link: https://t.co/mGXLjDHRuZ
#malware #resource #redteam #basics #cybersecurity
7
39
147
Malware Development - Creating A Custom C2 Agent Part 3 https://t.co/UvY1QTuUSl We finally coded our PowerShell skeleton. Next steps are encryption, callback implementation and the best part - custom commands.
1
35
171
If I had to start all over again to become a red teamer in 2024, what would I do? https://t.co/w1csIv6HWx
Assuming a solid foundation in Networking/Operating systems/Coding, start practicing on @hackthebox_eu then obtain the @zeropointsecltd RTO I & II certifications. Next pick your poison with either MalDev specialization or @offsectraining or @SANSOffensive training
8
30
108
Have you wanted to learn a programming language but aren't sure where to start? @appSecExp shares the methodology and working knowledge that will allow you to approach learning any new programming language from scratch. Get started on your coding journey today!
2
6
37
I spoke at #BluehatIndia on Defending with the Graph of Graphs 🔗 https://t.co/NrI8iYmzXD
github.com
Shared Blogs and Notebooks. Contribute to JohnLaTwC/Shared development by creating an account on GitHub.
2
21
85