Ptrace Security GmbH
@ptracesecurity
Followers
58K
Following
3K
Media
18K
Statuses
21K
Empowering IT Security Professionals through Hands-On Online Courses.
Zug, Switzerland
Joined May 2009
Inside BRUTED: Black Basta (RaaS) Members Used Automated Brute Forcing Framework to Target Edge Network Devices https://t.co/E3aurc59nn
#pentesting #cyberSecurity #infosec
1
22
47
Open-Source Intelligence(OSINT): Sherlock - The Ultimate Username Enumeration Tool https://t.co/vt8ZLn2iGq
#pentesting #OSINT #Hacking #CyberSecurity #infosec
0
12
24
Hack The Emulated Planet: Vulnerability Hunting on Planet WGS-804HPT Industrial Switches https://t.co/xVMVq8sA34
#pentesting #Vulnerability #Hacking #CyberSecurity #infosec
0
11
21
In-Depth Technical Analysis of the Bybit Hack https://t.co/S1UZXqJSkJ
#pentesting #CyberSecurity #infosec
0
1
23
NEW No-Click Critical Vulnerability in Microsoft Windows: CVE-2025-21298 https://t.co/4TGJfOb0of
#pentesting #Vulnerability #CyberSecurity #infosec
1
17
60
0
5
22
Telegram video (mp4) extension manipulation PoC https://t.co/n4SyQQmY7F
#pentesting #PoC #CyberSecurity #infosec
0
6
25
!exploitable Episode Two - Enter the Matrix https://t.co/XRyRc4HX9a
#pentesting #exploit #CyberSecurity #infosec
0
7
23
Infostealer Campaign against ISPs https://t.co/aiWlu4mRxO
#Pentesting #CyberSecurity #InfoSec #EthicalHacking
#HackThePlanet #RedTeam #BlueTeam #CyberDefense #VulnerabilityManagement #CyberThreats #SecurityTesting #BugBounty #CyberResilience #SecureTheFuture
0
7
37
Exploring Heap Exploitation Mechanisms: Understanding the House of Force Technique https://t.co/ml2Utdpbkz
#pentesting #Exploit #CyberSecurity #infosec
0
15
56
Streamlining vulnerability research with IDA Pro and Rust https://t.co/MireS8GkVu
#pentesting #vulnerability #CyberSecurity #infosec
0
17
78
This map lists the essential techniques to bypass anti-virus and EDR https://t.co/CyXeqExkEO
#pentesting #bypassongg #CyberSecurity #infosec
1
70
196
Process Hollowing on Windows 11 24H2 https://t.co/KU1PnxyJmZ
#pentesting #Windows #CyberSecurity #infosec
0
33
114
WMI Malware: The Complete Forensics Guide https://t.co/mzdqkAybzR
#pentesting #Malware #CyberSecurity #infosec
0
18
63
D3m0n1z3dShell: Advanced Tool for persistence in Linux https://t.co/eB0V2Ro5ko
#pentesting #Linux #CyberSecurity #infosec
meterpreter.org
Advanced Tool for persistence in Linux. Features: Auto Generate SSH keypair for all users, Crontab Persistence, and more...
0
13
42
Introduction to x64 Linux Binary Exploitation (Part 1) https://t.co/vORlZebcdl
#pentesting #Linux #Exploit #infosec
0
9
47
BlueSpy - PoC to record audio from a Bluetooth device https://t.co/nvb7rZ2uOc
#pentesting #BlueSpy #Hacking #infosec
2
86
299
Uncovering Apple Vulnerabilities: diskarbitrationd and storagekitd Audit Part 3 https://t.co/cNfEwSfglV
#pentesting #Apple #vulnerability #infosec
0
3
13
Accidentally uncovering a seven years old vulnerability in the Linux kernel https://t.co/yCuIfu34XG
#pentesting #Linux #kernel #vulnerability #infosec
0
1
10