hacktricks_live Profile Banner
HackTricks Profile
HackTricks

@hacktricks_live

Followers
15K
Following
331
Media
69
Statuses
584

HackTricks offers free quality hacking resources in 17 languages: https://t.co/O1TVFk5r9q, https://t.co/0RhWRaaPIm Paid certs by HT-Training: https://t.co/2C0w8pkq6v

Joined May 2020
Don't wanna be here? Send us removal request.
@hacktricks_live
HackTricks
10 months
The best way to search for info in HackTricks is using https://t.co/dQb6U1L7rp, the search functionality in https://t.co/KFzAHanPNx and https://t.co/CH1UKsQ0Vs. It also works running HackTricks locally! You can also ask the HackTricks AI assistant in
0
10
87
@hacktricks_live
HackTricks
2 days
💡 Planning to level up your cybersecurity skills before 2026? Our Black Friday offers are live — and designed to get you ahead in Cloud Security training for AWS, GCP and Azure. Explore them here 👉 https://t.co/L56ztPW6BD #BlackFriday #HackTricks #Cloud #CyberSecurity
0
1
3
@theDeepView
The Deep View
14 hours
🚨 BREAKING: MBZUAI just released PAN, a new world model that actually understands physics and cause-and-effect. Unlike video generation models that just render appearances, PAN maintains an internal representation of how the world works and can simulate agent interactions over
1
1
11
@HackenProof
HackenProof
18 days
🚀 HackenProof is making history! For the first time ever, we’re launching a 🇺🇦 National CTF 2025 with the support of @DI_Ukraine - our most ambitious, large-scale competition yet.
2
11
49
@hacktricks_live
HackTricks
13 days
Which course are you diving into first? Let us know!
0
0
2
@hacktricks_live
HackTricks
13 days
🚀 Black Friday Month is here — and so are the biggest discounts of the year: 20% OFF all Courses 15% OFF Lab Extensions & Exam Vouchers +10% OFF Bundles 🕒 Valid Nov 1–30 💻 Discounts live at https://t.co/L56ztPWErb #BlackFriday #HackTricks #CyberSecurity #CloudSecurity
1
2
4
@Jaxxonjewelry
JAXXON
15 days
Premium men’s jewelry that elevates every fit. Black Friday deals live now!
0
20
101
@hacktricks_live
HackTricks
21 days
🗓️ It’s official. Early Black Friday access opens on November 1st. Get ready to access exclusive training offers from HackTricks Training. Stay tuned — more details coming soon #BlackFriday #HackTricks #CyberSecurity #Cloud
0
0
4
@hacktricks_live
HackTricks
22 days
Learn more about how App Service misconfigurations can lead to privilege escalation here: https://t.co/l6Ntz0UUar And get hands-on experience with the Azure Red Team Expert Certification (AzRTE): https://t.co/XZSyKUASwy #Hacktricks #HacktricksTraining #Azure
0
1
5
@hacktricks_live
HackTricks
22 days
Hidden risks in Azure App Services Azure App Services expose management and publishing interfaces that can grant deep access. With the right permissions or attackers could retrieve credentials enable SSH. Review roles, rotate profiles, and disable unused FTP/SCM.
1
2
3
@hacktricks_live
HackTricks
29 days
⏳ The countdown has started. Our Black Friday offers are loading. Stay tuned — they’re coming soon. #BlackFriday #HackTricks #Cloud #CyberSecurity
0
0
2
@7h3h4ckv157
7h3h4ckv157
1 month
Azure AD Connect Credential Extractor The script will attempt to: Connect to the ADSync SQL database, Load the necessary cryptographic library (mcrypt.dll). Retrieve and decrypt stored credentials (Domain, Username, and Password). https://t.co/04ggEanMnt
Tweet card summary image
github.com
This PowerShell script is designed for authorized penetration testing and security labs to extract and decrypt credentials from Azure AD Connect Sync configurations. The script connects to the ADSy...
0
53
254
@hacktricks_live
HackTricks
1 month
HackTricks just got even more accessible!🌍 Did you know that HackTricks & HackTricks Cloud are already available and kept up to date in 17 different languages? Now, the search button 🔍 has been upgraded — it will search in the same language you’re browsing HackTricks in!
0
0
3
@hacktricks_live
HackTricks
1 month
Learn more about how workflows can lead to privilege escalation here: https://t.co/EdXd0onO6H And get hands-on experience with the GCP Red Team Expert Certification (GRTE):
0
1
1
@hacktricks_live
HackTricks
1 month
GCP Workflows — what your orchestrations might reveal Over-priv or plaintext creds can leak secrets, hit other APIs, and enable lateral movement. Treat workflows as sensitive code: least privilege, no creds in params, use Secret Manager, watch audit logs & restrict deploy/modify.
1
1
1
@hacktricks_live
HackTricks
1 month
Practice in our hands-on labs and learn more about these concepts with AWS Training Red Team Expert Certification - ARTE. Enroll now at
0
1
1
@hacktricks_live
HackTricks
1 month
ECR: what’s inside Docker images AWS ECR images can hide code, configs,even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at
1
1
3
@hacktricks_live
HackTricks
1 month
ECR: what’s inside Docker images AWS ECR images can hide code, configs, even secrets & API keys. Pulling them may expose data. Scan images for vulns & secrets, enforce least privilege, and don't bake long-lived creds. Learn more at
0
1
1
@cyb_detective
Cyber Detective💙💛
2 months
RExpository List of 200+ regular expressions for sensitive data extraction: - usernames - IPs - emails - API Keys - Access Tokens - Hashes and others. https://t.co/nJxckcxDSr By Jaime Polop with @hacktricks_live
1
58
260
@k8studio1
K8Studio
2 months
HackTricks & https://t.co/iuwy3pH1U1 We’re uniting forces to contribute to the cloud security space. @hacktricks_live brings world-class expertise in security research & training, while ☸️ https://t.co/iuwy3pH1U1 focuses on building intuitive Kubernetes tools. #Kubernetes
0
1
2
@hacktricks_live
HackTricks
2 months
HackTricks Training 🤝 K8Studio Partnering with @k8studio1 : an intuitive Kubernetes IDE that streamlines cluster management, monitoring & deployment. Try their new DevSec View for a clear look at your K8s security posture. https://t.co/3fGpwUOPYd #K8s #DevSecOps #Hacktricks
0
1
2
@hipotermia
hipotermia
2 months
Thanks to everyone who joined us at the @Hacker0x01 Brand Ambassadors Speed Show&Tell in Madrid, and special thanks to all who presented! 💕
6
12
123
@JoelGMSec
Joel GM
2 months
Después de mucho tiempo.. Nueva herramienta y entrada en el #blog!🙃 NekoDNS: Jugando con DNS una vez más: https://t.co/hzePeb2qie NekoDNS - Experimental Reverse DNS Shell: https://t.co/JHnW1rOBgo #Darkbyte #Hacking #DNS #ReverseShell #NekoDNS
2
17
57