MOR DAVID
@m0rd4vid
Followers
311
Following
283
Media
7
Statuses
25
Cyber Security Expert & Red Teamer with 5+ Years of Experience.
Israel
Joined April 2019
vCenterHound is out - start the hunt today: https://t.co/qA9keKlFBN
github.com
Collect infrastructure and permissions data from vCenter and export it as a BloodHound‑compatible graph using Custom Nodes/Edges - MorDavid/vCenterHound
2
3
15
Dear fellow pentesters & red teamers, How often do you run into a vCenter in your client’s environment? 🖥️ I just built one for vCenter - meet vCenterHound 🐾😉 This is just the beginning… more collectors and surprises are on the way. #Pentesting #RedTeam #BloodHound #vCenter
1
38
158
📷 BloodHound-MCP: The first-ever AI integration for BloodHound! I release it now! Make sure you star it on GitHub! https://t.co/bRRpu0k2re Join our telegram: https://t.co/oqcXJkYT1a
#BloodHound #CyberSec #RedTeam #BlueTeam #InfoSec #CyberTools #Cursor #OpenAI #Claude #MCP
1
8
11
🔍 Just finished creating my #BloodHound viewer extension! 1. Query history navigation (was in the old bloodhound) 2. Integrated Neo4j browser access 3. Custom color scheme etc.. Let me know what you think! #Pentesting #CyberSecurity #RedTeam #InfoSec #ADTools #CyberTools
0
0
2
This is a basic proof of concept for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks within the code. https://t.co/goOnYGfp2c
#Winrar #POC #CVE #CVE23
github.com
This is a POC for the CVE-2023-3883 exploit targeting WinRAR up to 6.22. Modified some existing internet-sourced POCs by introducing greater dynamism and incorporated additional try-except blocks w...
2
1
3
🚨 Exciting news🚨 Uncovering a Message Thread Between Hackers. I've just published an article detailing my investigation into a fake text message. https://t.co/0NvVMYi3l0
#Phishing #Cybersecurity #PhishingAwareness #CyberAwareness
medium.com
It is a known fact that civilians often fall prey to SMS phishing scams. Hackers try to take advantage of unsuspecting people, especially…
1
0
0
I'm glad to share with you my first nuclei template for CVE-2022-42889 recognizes Text4Shell. I hope it will be merge to official nuclei-templates repository soon. @pdnuclei
#text4shell #CVE202242889 #CVE #exploit #PoC #vulnerability #nuclei
https://t.co/rChiTe7FTH
github.com
Template / PR Information Apache Commons Text 1.5-1.9, CVE-2022-42889 affects Apache Commons Text versions 1.5 through 1.9. It has been patched as of Commons Text version 1.10. Added CVE-2022-4288...
1
2
3
Proud to be part of WD for Hall of Fame for reporting a security vulnerability in their website. https://t.co/ScwBxUzuYE Glad to make this world a better and safer place😉 #WDC21010 #bugbounty #bughunting #bughunter
1
1
1
I created a client program that connects with Telegram and checks if there is a new Telegram message. If there is - it executes my commands remotely. https://t.co/KT3ExliyZw
0
0
2
Hi everybody, I introduce you to my new scanner tool - MD-Fuzzer, I will upgrade the tool and add more functions often. I developed a Chrome addon that makes fuzzing requests getting vulnerable parameters on the website. Github: https://t.co/fGOOLBJUwp
0
0
3
2
0
2