Hackstack Security
@hackstacksec
Followers
831
Following
603
Media
23
Statuses
268
We're a dedicated Team of Cyber Security Professionals providing quality VAPT , IT Auditing and IT Security Consultancy. 📩 DM To Get Your Pentest Done.
Mountain Top, PA
Joined January 2020
70% of cybersecurity is filled with only script kiddies
0
1
7
Notepad++ Vulnerability Let Attackers Hijack Network Traffic to Install Malware via Updates https://t.co/Ew0mWhWLE9 Hackers recently observed suspicious traffic patterns involving WinGUp, the built-in updater used by Notepad++. According to their findings, update requests were,
0
2
10
Replace these popular apps with secure and open-source alternatives to protect your data: WhatsApp → Signal Google Drive → Nextcloud/Seafile X → Mastodon VPN → Mullvad Zoom → Jitsi Meet Gmail → Proton Mail Google Analytics → Matomo/Plausible Dropbox → Syncthing Google
90
269
2K
Practical Thick Client Pentesting Checklist 1. Dump process memory; grep for session tokens or credentials 2. Analyze clipboard contents after key application operations 3. Extract SQLite/LevelDB/custom databases for orphaned secrets 4. Scan update and installer config files
hetmehta.com
A practical thick client pentesting checklist by Het Mehta covering environment setup, static analysis, dynamic analysis, network, and reporting, with detailed commands and tools.
1
18
98
I shared my take on CTFs, and you blew up my notifications! You want real resources for skills companies pay for? Here’s a no-fluff list to get you hired👇
9
46
324
Breaking Security AMA A weekly series featuring top hackers and cybersecurity professionals. This edition: @PayloadArtist will answer your questions on AppSec, bug bounties, and web hacking right here in the comments! Ask below in comments or by using #InfosecAMA Hurry,
10
6
34
We're hiring interns for Cybersecurity Business Development! DM for more details.
89
55
439
BRUTAL TRUTH: 83% of Pentest candidates fail interviews despite having solid technical skills After conducting 50+ security interviews and helping dozens land their dream roles, here's why most fail (and the exact fix) 🧵 #CyberSecurity #InfoSec #TechCareers
9
104
610
#Infosec Hiring
We’re hiring a Senior Security Analyst (Remote)! Focus areas: SCA, VAPT, Cloud Security, and Threat Modeling. Looking for 4+ years of hands-on infosec experience. ( Product Security ) DMs are Open!
0
0
1
Powershell For Hackers: Exploitation Essentials Practical guide on how to use PowerShell for hacking and penetration testing. #PowerShell #RedTeam #CyberSecurity #PostExploitation #Hacking
https://t.co/1wP1D8ldSA
hetmehta.com
A red teamer’s guide to PowerShell for post-exploitation: enum, privesc, persistence, and C2
0
49
203
Free SOC 2 TSC Checklist Map your Security, Availability, Integrity, Confidentiality & Privacy controls with this simple, practical guide. How to get? Comment SOC2 and I'll share you the link for the checklist. #SOC2 #CyberSecurity #Checklist
4
2
22
Check out my latest article: Data Security Isn't Just an IT Problem – It's Our Responsibility
linkedin.com
Hey everyone, Scrolling through my LinkedIn feed, I'm constantly amazed by the innovation, collaboration, and sheer amount of information we share and consume daily. We build businesses, connect with...
0
1
7
Take a look at my blog w/ @Bugcrowd where I talk about RCE and one of the ways it landed me a critical payout! https://t.co/iaqONivw4H
bugcrowd.com
I like to think of RCE not just as a bug but as an impact. Why? Because there are numerous ways—literally 1001—to achieve RCE. The initial foothold for an RCE attack can vary significantly, ranging...
10
65
309
Master subdomain takeover vulnerabilities! 😎 A thread 🧵 👇
7
60
438