Я могу предоставить доступ и доступ к бизнесу.
Bro lets work ...and lets have a TEAM if possible ...who wants to work on a team? I have experience writing evil and exploits. I'm good at encryption and obfuscation. I also have experience in reverse engineering. I write for Windows and Linux.
Before social Engineering recon is needed ... if you know your target well nothing can stop you from getting all the Needed accessIts not easy to filter and target your targets not all people have the skills in social engineering And iam on those who dont have this skill , but i have the skills to create my Own tool .. so yes these are two different issues !![]()
Bro if you have all those SKILLS why LOOKING FOR EMPLOYEMNT...??? YOU can have a TEAM on your own ..Python/Golang coding (exploit writing)
CVE experience about understanding and writing global fuzzing tools for vulns.
*nix system experience.
Msf/CS experience.
Experience on public pentest frameworks such as codiac, PowershellEmpire etc.
.LNK/XLSX/.BAT/.ISO extensions crypting and creating experience. (Can work with office win32 macros).
Windows internal experience, DomainAdmin, CredentialHarvest etc.
Have qualified experience operational security (OPSEC).
I can work any team with good income
PM for requests.
Super talented ... LETS WORK if possible bosswho wants to work on a team? I have experience writing evil and exploits. I'm good at encryption and obfuscation. I also have experience in reverse engineering. I write for Windows and Linux.
Do u know how to work with AD?Super talented ... LETS WORK if possible boss
Da znayu prosta xochu uslishat ot yevo, Balabolli on ili net. Pust dakajut shto on the real mega ultra super sonic pentester =)Почитай посты pentesterMaster) Он даже гуглить не умеет, какой там пентест...
Read pentesterMaster posts. He even can't google things, what pentest are you talking about![]()
In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineeringhey bros, I has began coding my own Ransomware and I was wondering if this business model is profitable. In your experience, what you guys think about that? I see two ways to make profit coding ransomware.... 1) Selling them to ransomware groups or 2) using them to promoting our own attacks. Is that really profitable? What do you think about?
Сколько не читал интервью с рансомщиками все они как один пишут что ломают корпы эксплоитами с гитхаба.In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineering
This is wholly untrue. I have found several large businesses/corporations exposing their entire infrastructure with no host isolation, virtualization, or otherwise... off-site NAS creds on desktops, everything. Not sure where experience with RE would be necessary, unless that, too, was a reference to exploit development.In my opinion it's profitable only if you have a Big team and the company you hit with you're ransomware Have confidence in you. Also you need to be really good at social engineering, and coding. And you need budget if you want to skip thé social engineering part, exploit known vuln or 0day that require a lot of money or good skill AT reverse engineering
Bro ..those are CHILDISH stuffs... a lot of materials are out there for FREEDo u know how to work with AD?
Do u know how to use msf and cobalt?
Do u know how to up from LU/LA to DC?
Do u have active exploits for VPN and Rdp?
If yes i can provide materials to work with. Maybe with lab also![]()
What childish stuff u mean from my side exactly? I am offering u partnership not asking ur stuff. U got those knowledges and things or not? I need answer for that question!Bro ..those are CHILDISH stuffs... a lot of materials are out there for FREE
How is demonstrative proficiency with server edt environments childish at all? Regardless, your interpretation of skill maturity don't really make a difference with regards to requisitionBro ..those are CHILDISH stuffs... a lot of materials are out there for FREE
You asked what is AD... who does not know about AD and want to have a ransomware ops...??Do u know how to work with AD?
Do u know how to use msf and cobalt?
Do u know how to up from LU/LA to DC?
Do u have active exploits for VPN and Rdp?
If yes i can provide materials to work with. Maybe with lab also![]()
еще сегодня в паблике это вчерашние пиздюки которые в чатах тг лизали очки вайтам и говорили что ранс х#йня для дауновСколько не читал интервью с рансомщиками все они как один пишут что ломают корпы эксплоитами с гитхаба.
Согласно гражданскому иску о конфискации имущества, поданному офисом ФБР в Далласе, это, по-видимому, очень выгодно. Я не могу вспомнить, какая сумма была возвращена, но она составляла где-то от 4 до 200 миллионов долларов. Я не могу вспомнить ни группу, ни имя пользователя партнера, но я помню, что проходил мимо обсуждений год назад.hey bros, I has began coding my own Ransomware and I was wondering if this business model is profitable. In your experience, what you guys think about that? I see two ways to make profit coding ransomware.... 1) Selling them to ransomware groups or 2) using them to promoting our own attacks. Is that really profitable? What do you think about?