HackTricks
@hacktricks_live
Followers
15K
Following
331
Media
69
Statuses
584
HackTricks offers free quality hacking resources in 17 languages: https://t.co/O1TVFk5r9q, https://t.co/0RhWRaaPIm Paid certs by HT-Training: https://t.co/2C0w8pkq6v
Joined May 2020
The best way to search for info in HackTricks is using https://t.co/dQb6U1L7rp, the search functionality in https://t.co/KFzAHanPNx and https://t.co/CH1UKsQ0Vs. It also works running HackTricks locally! You can also ask the HackTricks AI assistant in
0
10
87
💡 Planning to level up your cybersecurity skills before 2026? Our Black Friday offers are live — and designed to get you ahead in Cloud Security training for AWS, GCP and Azure. Explore them here 👉 https://t.co/L56ztPW6BD
#BlackFriday #HackTricks #Cloud #CyberSecurity
0
1
3
🚨 BREAKING: MBZUAI just released PAN, a new world model that actually understands physics and cause-and-effect. Unlike video generation models that just render appearances, PAN maintains an internal representation of how the world works and can simulate agent interactions over
1
1
11
🚀 HackenProof is making history! For the first time ever, we’re launching a 🇺🇦 National CTF 2025 with the support of @DI_Ukraine - our most ambitious, large-scale competition yet.
2
11
49
🚀 Black Friday Month is here — and so are the biggest discounts of the year: 20% OFF all Courses 15% OFF Lab Extensions & Exam Vouchers +10% OFF Bundles 🕒 Valid Nov 1–30 💻 Discounts live at https://t.co/L56ztPWErb
#BlackFriday #HackTricks #CyberSecurity #CloudSecurity
1
2
4
Premium men’s jewelry that elevates every fit. Black Friday deals live now!
0
20
101
🗓️ It’s official. Early Black Friday access opens on November 1st. Get ready to access exclusive training offers from HackTricks Training. Stay tuned — more details coming soon #BlackFriday #HackTricks #CyberSecurity #Cloud
0
0
4
Learn more about how App Service misconfigurations can lead to privilege escalation here: https://t.co/l6Ntz0UUar And get hands-on experience with the Azure Red Team Expert Certification (AzRTE): https://t.co/XZSyKUASwy
#Hacktricks #HacktricksTraining #Azure
0
1
5
Hidden risks in Azure App Services Azure App Services expose management and publishing interfaces that can grant deep access. With the right permissions or attackers could retrieve credentials enable SSH. Review roles, rotate profiles, and disable unused FTP/SCM.
1
2
3
⏳ The countdown has started. Our Black Friday offers are loading. Stay tuned — they’re coming soon. #BlackFriday #HackTricks #Cloud #CyberSecurity
0
0
2
Azure AD Connect Credential Extractor The script will attempt to: Connect to the ADSync SQL database, Load the necessary cryptographic library (mcrypt.dll). Retrieve and decrypt stored credentials (Domain, Username, and Password). https://t.co/04ggEanMnt
github.com
This PowerShell script is designed for authorized penetration testing and security labs to extract and decrypt credentials from Azure AD Connect Sync configurations. The script connects to the ADSy...
0
53
254
HackTricks just got even more accessible!🌍 Did you know that HackTricks & HackTricks Cloud are already available and kept up to date in 17 different languages? Now, the search button 🔍 has been upgraded — it will search in the same language you’re browsing HackTricks in!
0
0
3
Learn more about how workflows can lead to privilege escalation here: https://t.co/EdXd0onO6H And get hands-on experience with the GCP Red Team Expert Certification (GRTE):
0
1
1
GCP Workflows — what your orchestrations might reveal Over-priv or plaintext creds can leak secrets, hit other APIs, and enable lateral movement. Treat workflows as sensitive code: least privilege, no creds in params, use Secret Manager, watch audit logs & restrict deploy/modify.
1
1
1
Practice in our hands-on labs and learn more about these concepts with AWS Training Red Team Expert Certification - ARTE. Enroll now at
0
1
1
ECR: what’s inside Docker images AWS ECR images can hide code, configs,even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at
1
1
3
ECR: what’s inside Docker images AWS ECR images can hide code, configs, even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at
0
1
1
RExpository List of 200+ regular expressions for sensitive data extraction: - usernames - IPs - emails - API Keys - Access Tokens - Hashes and others. https://t.co/nJxckcxDSr By Jaime Polop with @hacktricks_live
1
58
260
HackTricks & https://t.co/iuwy3pH1U1 We’re uniting forces to contribute to the cloud security space. @hacktricks_live brings world-class expertise in security research & training, while ☸️ https://t.co/iuwy3pH1U1 focuses on building intuitive Kubernetes tools. #Kubernetes
0
1
2
HackTricks Training 🤝 K8Studio Partnering with @k8studio1 : an intuitive Kubernetes IDE that streamlines cluster management, monitoring & deployment. Try their new DevSec View for a clear look at your K8s security posture. https://t.co/3fGpwUOPYd
#K8s #DevSecOps #Hacktricks
0
1
2
Thanks to everyone who joined us at the @Hacker0x01 Brand Ambassadors Speed Show&Tell in Madrid, and special thanks to all who presented! 💕
6
12
123
Después de mucho tiempo.. Nueva herramienta y entrada en el #blog!🙃 NekoDNS: Jugando con DNS una vez más: https://t.co/hzePeb2qie NekoDNS - Experimental Reverse DNS Shell: https://t.co/JHnW1rOBgo
#Darkbyte #Hacking #DNS #ReverseShell #NekoDNS
2
17
57