Bilal (@0xcc00) 's Twitter Profile
Bilal

@0xcc00

Writing buggy code

ID: 1420015531638378512

calendar_today27-07-2021 13:38:26

37 Tweet

438 Followers

238 Following

Suppressed News. (@suppressednws) 's Twitter Profile Photo

He left from Israel prison with broken arms and fingers, with a broken soul. She left Gaza with a pet. Do you guys understand the difference?

He left from Israel prison with broken arms and fingers, with a broken soul. 

She left Gaza with a pet. 

Do you guys understand the difference?
Bilal (@0xcc00) 's Twitter Profile Photo

Today i was recognized by Fortinet for finding a High severity vulnerability CVE-2024-21760 in the FortiSOAR product

Today i was recognized by Fortinet for finding a High severity vulnerability CVE-2024-21760 in the FortiSOAR product
Bilal (@0xcc00) 's Twitter Profile Photo

Wrote a quick sliver C2 extension to implement UAC bypassing via cmstp. You can check it out here: github.com/0xb11a1/sliver…

Bilal (@0xcc00) 's Twitter Profile Photo

You've gained Domain Admin privileges, but an EDR is blocking your attempts to dump the entire domain's hashes. In this article, I'll share a technique I used to bypass this obstacle. medium.com/@0xcc00/bypass…

Bilal (@0xcc00) 's Twitter Profile Photo

New quick article, Hiding behind the library line - Go malware development It's about exploring a technique of hiding your malicious code inside Go libraries to mislead analysts and reverse engineers. link: medium.com/@0xcc00/hiding…

vx-underground (@vxunderground) 's Twitter Profile Photo

Drama++ The United States government is using a fork of Signal called "TM SGNL". TM SGNL is (likely) produced by an Israeli firm (Smarsh) which is (or related to in some capacity) the Israel Defense Forces' Intelligence unit. Although these claims are based on self-described

Bilal (@0xcc00) 's Twitter Profile Photo

The new AI tool from google (Gemini-cli) performs impressively well. Here, I made it perform a simple internal penetration test by having it control a C2 beacon (Sliver) through an MCP server, and gave it access to Netexec and Hashcat I may write a blog about it if I continue it

Bilal (@0xcc00) 's Twitter Profile Photo

I've been playing with MCP, Releasing AdaptixC2_mcp a PoC that exposes Adaptix-C2 APIs to gemini-cli, enabling it to control a beacon and to simulate a threat actor behavior. Code: github.com/0xb11a1/Adapti…