k4m1ll0.com
Open in
urlscan Pro
185.111.89.230
Public Scan
URL:
https://k4m1ll0.com/
Submission: On September 27 via manual from NL — Scanned from NL
Submission: On September 27 via manual from NL — Scanned from NL
Form analysis
1 forms found in the DOMPOST https://www.paypal.com/donate
<form action="https://www.paypal.com/donate" method="post" target="_top">
<input type="hidden" name="hosted_button_id" value="FVRDD2K67YSL4">
<input type="image" src="https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif" border="0" name="submit" title="PayPal - The safer, easier way to pay online!" alt="Donate with PayPal button">
<img alt="" border="0" src="https://www.paypal.com/en_HU/i/scr/pixel.gif" width="1" height="1">
</form>
Text Content
WELCOME! I am a hacker from Hungary, my name is Matek Kamilló (k4m1ll0,<ᚫᛗIᛚᛚᛟ). I occasionally perform vulnerability tests, penetration tests, source code reviews, and related work (phishing simulation) for various companies. In addition to all these tasks, I usually teach practical training on ethical hacking and log analysis to small groups. I like to create specifically offensive code. My favorite topics are reverse engineering and exploit development. In most cases, I cannot talk about my work because of confidentiality contracts, except for my public works. I created this page to make these of my works available. If you need an Ethical Hacker, do not hesitate to contact me. CONTACT INFORMATION * Linkedin * Twitter * Email: matek.kamillo@gmail.com * Email2: k4m1ll0@protonmail.com * Phone: +3620-807-98-95 * Discord: k4m1ll0#9509 * Hackthebox profile CERTIFICATIONS * OSWE - Offensive Security Web Expert (2021) * OSCP - Offensive Security Certified Professional (2020) * OSWP - Offensive Security Wireless Professional (2019) * KCEH - Etikus Hacker Képzés - Cyber Institute (2018) https://www.credential.net/65d620ba-df4d-4640-ad1c-b6666d1e28b9 MY CVE-S Microsoft Shift F10 Bypass + Autopilot privesc Microsoft Shift F10 Bypass + Autopilot privesc CVE-2022-29402 TP-Link TLWR840N EU V5 and V6.20 UART shell CVE-2021-41653 TP-Link TLWR840N EU V5 Remote Code Execution CVE-2021-36697 CVE-2021-36698Pandora FMS 755 - Chained Remote Code Execution - HTACCESS CVE-2021-34075Pandora FMS 754 - Sensitive info on the client side CVE-2021-35501 CVE-2021-34074 Pandora FMS 754 XSS - Chained Remote Code Execution CVE-2020-8497Pandora FMS 742 File Repository Chat history CVE-2020-7935Pandora FMS 742 File Manager + Remote Code Execution 2 CVE-2020-8511Pandora FMS 742 File Repository + Remote Code Execution CVE-2020-8500Pandora FMS 743 Online/Offline Updater/Extension PHP upload + Remote Code Execution CVE-2019-20050Pandora FMS 742 Remote Code Execution File Manager "MimeType" CVE-2019-19968Pandora FMS 7.xx multiple XSS vulnerabilities CVE-2019-19681Pandora FMS Remote Code Execution (Alert Manager) You can support my research with a coffee if you find it interesting: BTC: bc1qxza23cdutkf4pjujy8yfpqp6rd4w4k3wntpp79 PRESS * https://www.fortinet.com/blog/threat-research/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability * https://securityaffairs.co/wordpress/125450/malware/dark-mirai-botnet-tp-link.html * https://www.bleepingcomputer.com/news/security/dark-mirai-botnet-targeting-rce-on-popular-tp-link-router/ * https://www.inforisktoday.com/new-mirai-based-campaign-targets-unpatched-tp-link-router-a-18098?utm_source=LinkedIn&utm_medium=CollateralSM&utm_campaign=editorial_post * https://portswigger.net/daily-swig/pandora-monitoring-system-pwned-by-chained-vulnerability-exploit PRESS (HUNGARIAN) * https://www.napi.hu/tech/tp-link-router-tech-kiberbunozes-hacker.754001.html * https://hvg.hu/tudomany/20220609_tp_link_router_sebezhetoseg_felhasznaloi_adatok_vedelme * https://24.hu/tech/2022/06/09/tp-link-tlwr840n-eu-v6-20-router-serulekenyseg-frissites-kpmg-matek-kamillo/ * https://hvg.hu/tudomany/20211213_tp_link_router_tl_wr840n_sebezhetoseg_hacker_firmware * https://itbusiness.hu/technology/security_n/serulekeny-egy-nepszeru-lakossagi-wifi-router * https://24.hu/tech/2021/12/13/tp-link-tl-wr840n-router-serulekenyseg-frissites-manga-dark-kpmg/ * https://virusirto.hu/blogbejegyzesek/2021/12/10/tp-link-routerekbe-bujt-a-dark-mirai-botnet/ * https://itbusiness.hu/technology/security_n/magyar-etikus-hacker-fedezte-fel-a-monitorozo-rendszer-kritikus-serulekenysegeit * https://www.napi.hu/tech/pandora-matek-kamillo-kpmg-kritikus-serulekenyseg-etikus-hacker.733702.html * https://biztonsagpiac.hu/magyar-etikus-hacker-talalt-sulyos-9-8-as-erossegu-serulekenyseget/ HACKERSULI (HUNGARIAN) * https://www.youtube.com/watch?v=fbyle0BPoHw © 2019-2022 Kamilló Matek (<ᚫᛗIᛚᛚᛟ) All Rights Reserved