And they continue... Lockbit has been going strong for 6yrs now I think??
This is going to turn into the Fast & Furious franchise. Can't wait for LockBit6.0!
Onion link:
hxxp://lockbitfbinpwhbyomxkiqtwhwiyetrbkb4hnqmshaonqxmsrqwg7yad.onion/
Pyramid is a set of Python scripts and module dependencies that can be used to evade EDRs. The main purpose of the tool is to perform offensive tasks by leveraging some Python evasion properties and looking as a legit Python application usage.
meterpreter.org/pyramid-python…
FFFERRRERREEEEEEE COURSSSEEEE TIMEEEEEEEE
🚀 More than 1000 hackers already jumped on this — are you next?
My CNWPP (Certified Network & Web App Pentesting Professional) course is blowing up.
I dropped a free coupon, and the community went wild — over 1000 people grabbed it…
CVE-2025-53772 IIS WebDeploy RCE
vulnerability in msdeployagentservice and msdeploy.axd endpoints of Microsoft Web Deploy, where unsafe deserialization of HTTP header contents allows an authenticated attacker (RCE).
hawktrace.com/blog/cve-2025-…
🚨🚨CVE-2025-53772(CVSS 8.8): Critical RCE in Microsoft IIS WebDeploy! Authenticated attackers can exploit untrusted data deserialization via HTTP headers to execute code remotely.
🔥PoC: gist.github.com/hawktrace/6783…
Search by vul.cve Filter👉vul.cve="CVE-2025-53772"
ZoomEye…
🚨🚨CVE-2025-53772(CVSS 8.8): Critical RCE in Microsoft IIS WebDeploy! Authenticated attackers can exploit untrusted data deserialization via HTTP headers to execute code remotely.
🔥PoC: gist.github.com/hawktrace/6783…
Search by vul.cve Filter👉vul.cve="CVE-2025-53772"
ZoomEye… https://t.co/RJZFjLsXkT
DLL Sideloading for Initial Access – Red Team Operator's Guide 🔥 (new article)
print3m.github.io/blog/dll-sidel…
- finding software to backdoor
- finding DLL and function to backdoor
- legit software backdooring
- OPSEC considerations
#redteam#infosec#malware#security
Bug Bounty Tool:
Use cloud_enum to enumerate public cloud resources.
It has helped me find a few exposed S3 buckets on bug bounty programs.
github.com/initstring/clo…
CVE-2025-3515 - WordPress File Upload RCE - file upload vulnerability in the "Drag and Drop Multiple File Upload for Contact Form 7" WordPress plugin that allows unauthenticated attackers to upload malicious files and achieve remote code execution.
github.com/blueisbeautifu…
6 Followers 225 FollowingConsultoria em TI;
CyberSecurity Intelligence;
Teste de intrusão (pentest);
Suporte técnico em Informática;
Certificado Digital;
Criação de app e sites.
2 Followers 110 FollowingFuture smart contract engineer 🧠currently learning solidity via @cyfrinupdraft ||
I will Share wins,fail and growth with you💪| let’s build the #web3 together
68K Followers 586 FollowingHigh Queen of the Cybers | Educator | Content Creator | UwU-Anointed Wapp King | Ex-Brit | https://t.co/04RRExvxXj (he/him) 🇺🇸 I run gameshows at DEF CON.
80K Followers 5K FollowingANON Digital Soldier 🇮🇪
Q since 2017
Banned from YouTube since 2020
Documentary vids free on Rumble (MrTruthBomb2) https://t.co/MKpd1dOizJ
4K Followers 600 FollowingElastic Security Labs is democratizing security by sharing knowledge and capabilities necessary to prepare for threats. Spiritually serving humanity since 2019.
409K Followers 100 FollowingGiving you actionable tips to help you boost your energy level & confidence. I share insights on health & wellness. MSc Physiotherapy | BSc Pharmacognosy
101K Followers 2K FollowingFollow for posts about GitHub repos, DSPy, and agents
Subscribe for top posts
DM to share your AI project (Due to volume of DMs I'll prioritize subscribers)
2K Followers 492 FollowingAcknowledged by Google, Yahoo, U.S. Department of Defense, Tiktok, Logitech, Sony, MTN Group, SEGA and many more.
https://t.co/j7oWJ8FXQ9
364 Followers 505 FollowingEn MonkeysLab buscamos soluciones a problemas difíciles de ciberseguridad y entrenamos a los líderes que harán del mundo un lugar mejor #CyberSec #ML #IA
2K Followers 289 FollowingGoby is a powerful security tool that includes a vulnerability scanner and asset mapping functionality. visit https://t.co/oFhWvigmwi.
63K Followers 82 FollowingThe latest research and news from Unit 42, the Palo Alto Networks (@paloaltontwks) Threat Intelligence and Security Consulting Team covering incident response.