
McSam
@theMcSam
Followers
479
Following
1K
Media
91
Statuses
2K
RT @ryanetornam: 🧑💻🔎From Logs to Insights: Bridging the Gap between AI and Security Operations ⭐️. Security teams often spend hours diggin….
0
4
0
RT @BugBountyDEFCON: To celebrate our badge launch, we're giving away FIVE free 6-month licenses to @pentesterlab. ✅ Comment BADGELIFE and….
0
306
0
RT @bytetimesession: 📢 BYTE TIME SESSIONS: BINARY EXPLOITATION WEBINAR.🎯 Topic: Bending the Bytes of Software — Basics of Binary Exploitati….
0
3
0
To help others test the vulnerability in a controlled environment, I’ve included a setup script for Gogs: I hope it helps others better understand and validate this issue. (4/4).
github.com
Exploit Code for CVE-2024-39930 gogs ssh server RCE - theMcSam/CVE-2024-39930-PoC
0
0
1
I've documented the full process, including technical insights and a step-by-step breakdown, on my blog: The PoC exploit code is available here: (3/4).
github.com
Exploit Code for CVE-2024-39930 gogs ssh server RCE - theMcSam/CVE-2024-39930-PoC
1
0
2
RT @bytetimesession: Hello Byte Time Ninjas! @everyone . Remember our promise to host monthly knowledge-packed sessions? Well, it's that ti….
0
2
0
RT @bytetimesession: Yo, hacker crew! 🚀 Join our X Space as the hackmaster 🥷 @ens_nii drops 7 years of epic hacking & defending secrets.….
0
8
0
RT @Infosecpat: 🎉 GIVEAWAY ALERT! 🎉 From InfoSec Pat and a special thanks to ,. The Hack The Box Cyber Apocalypse CTF is live and in full….
0
6
0
We played in the Snyk Fetch The Flag CTF 2025, hosted by @_JohnHammond and @snyksec, and we put up an impressive fight! . Massive shoutout to my incredible teammates @markuche1337, @TroyLynx, and @QuophiZiv—y’all were skillful and unstoppable! . #Pwn #FetchTheFlag
2
3
13
RT @lauriewired: What’s the difference between MOV and LEA in assembly?. These instructions are often read almost interchangeably, but both….
0
23
0
RT @brCTF: We’d love to have media partners like @tv3_ghana involved to help spread the word about the importance of cybersecurity in Ghan….
0
2
0