lon3_rang3r Profile Banner
Lone Ranger 🇮🇳 Profile
Lone Ranger 🇮🇳

@lon3_rang3r

Followers
394
Following
148
Media
435
Statuses
8K

I wonder what goes wrong if I change this value here... Strike First. Strike Hard. No Mercy. Ambitious ladka!

No more
Joined May 2016
Don't wanna be here? Send us removal request.
@lon3_rang3r
Lone Ranger 🇮🇳
5 years
One more CVE in our bank, this time on jsonpickle, report by me and @_j0lt.
@CVEnew
CVE
5 years
CVE-2020-22083 jsonpickle through 1.4.1 allows remote code execution during deserialization of a malicious payload through the decode() function.
0
2
8
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
JDBG : Java Dynamic Reverse Engineering and Debugging Tool :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
AV/EDR Evasion Lab for Training & Learning Purposes :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Reverse-engineering an encrypted IoT protocol:
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
shadow-rs : Windows Kernel Rootkit in Rust :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Abusing multicast poisoning for pre-authenticated Kerberos relay over HTTP with Responder and krbrelayx :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Taking the relaying capabilities of multicast poisoning to the next level : tricking Windows SMB clients into falling back to WebDav :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
FullBypass : A tool which bypasses AMSI (AntiMalware Scan Interface) and PowerShell CLM (Constrained Language Mode) and gives you a FullLanguage PowerShell reverse shell :
0
0
1
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Indetectables - toolkit : The essential toolkit for reversing, malware analysis, and cracking :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Exploiting the EvilVideo vulnerability on Telegram for Android : credits @LukasStefanko.CVE-2024-7014 Return : Updated Evilloader : telegram-video-extension-manipulation-PoC :. credits @0x6rss.
0
0
1
@lon3_rang3r
Lone Ranger 🇮🇳
4 months
Bypassing AMSI and Evading AV Detection with SpecterInsight : New AMSI Bypss Technique Modifying CLR.DLL in Memory :
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
10 months
RT @orange_8361: New look for my blog!✨ Finally moved away from the Markdown-Unfriendly Blogger 😖.
0
64
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
As your service is shit and you guys are scammers about your extended warranty lets just let me know about the process of getting a refund of my AMC and service charges, or else I have to go to consumer court for the justice.
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
Digging for SSRF in NextJS apps:
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
Custom Shell Code Creation in x64: credits @s4dbrd.
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
Implementing a ChatGPT-like LLM from scratch, step by step:
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
QCSuper: Capture raw 2G/3G/4G/ 5G radio frames:
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
NTLM Relay Gat: a powerful tool designed to automate the exploitation of NTLM relays using credits.@fin3ss3g0d.
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
NetExec: The Network Execution Tool - a network service exploitation tool that helps automate assessing the security of large networks: Details:
0
0
0
@lon3_rang3r
Lone Ranger 🇮🇳
1 year
Embed A Malicious Executable in a Normal PDF or EXE:
0
0
0