k4m1ll0.com Open in urlscan Pro
185.111.89.230  Public Scan

URL: https://k4m1ll0.com/
Submission: On September 27 via manual from NL — Scanned from NL

Form analysis 1 forms found in the DOM

POST https://www.paypal.com/donate

<form action="https://www.paypal.com/donate" method="post" target="_top">
  <input type="hidden" name="hosted_button_id" value="FVRDD2K67YSL4">
  <input type="image" src="https://www.paypalobjects.com/en_US/i/btn/btn_donateCC_LG.gif" border="0" name="submit" title="PayPal - The safer, easier way to pay online!" alt="Donate with PayPal button">
  <img alt="" border="0" src="https://www.paypal.com/en_HU/i/scr/pixel.gif" width="1" height="1">
</form>

Text Content

WELCOME!

I am a hacker from Hungary, my name is Matek Kamilló (k4m1ll0,<ᚫᛗIᛚᛚᛟ).

I occasionally perform vulnerability tests, penetration tests, source code
reviews, and related work (phishing simulation) for various companies.

In addition to all these tasks, I usually teach practical training on ethical
hacking and log analysis to small groups.

I like to create specifically offensive code. My favorite topics are reverse
engineering and exploit development.

In most cases, I cannot talk about my work because of confidentiality contracts,
except for my public works. I created this page to make these of my works
available.

If you need an Ethical Hacker, do not hesitate to contact me.


CONTACT INFORMATION

 * Linkedin
 * Twitter
 * Email: matek.kamillo@gmail.com
 * Email2: k4m1ll0@protonmail.com
 * Phone: +3620-807-98-95
 * Discord: k4m1ll0#9509
 * Hackthebox profile


CERTIFICATIONS

 * OSWE - Offensive Security Web Expert (2021)
 * OSCP - Offensive Security Certified Professional (2020)
 * OSWP - Offensive Security Wireless Professional (2019)
 * KCEH - Etikus Hacker Képzés - Cyber Institute (2018)



https://www.credential.net/65d620ba-df4d-4640-ad1c-b6666d1e28b9


MY CVE-S



Microsoft Shift F10 Bypass + Autopilot privesc
Microsoft Shift F10 Bypass + Autopilot privesc CVE-2022-29402
TP-Link TLWR840N EU V5 and V6.20 UART shell CVE-2021-41653
TP-Link TLWR840N EU V5 Remote Code Execution CVE-2021-36697
CVE-2021-36698Pandora FMS 755 - Chained Remote Code Execution - HTACCESS
CVE-2021-34075Pandora FMS 754 - Sensitive info on the client side CVE-2021-35501
CVE-2021-34074 Pandora FMS 754 XSS - Chained Remote Code Execution
CVE-2020-8497Pandora FMS 742 File Repository Chat history CVE-2020-7935Pandora
FMS 742 File Manager + Remote Code Execution 2 CVE-2020-8511Pandora FMS 742 File
Repository + Remote Code Execution CVE-2020-8500Pandora FMS 743 Online/Offline
Updater/Extension PHP upload + Remote Code Execution CVE-2019-20050Pandora FMS
742 Remote Code Execution File Manager "MimeType" CVE-2019-19968Pandora FMS 7.xx
multiple XSS vulnerabilities CVE-2019-19681Pandora FMS Remote Code Execution
(Alert Manager)

You can support my research with a coffee if you find it interesting:



BTC: bc1qxza23cdutkf4pjujy8yfpqp6rd4w4k3wntpp79


PRESS

 * https://www.fortinet.com/blog/threat-research/manga-aka-dark-mirai-based-campaign-targets-new-tp-link-router-rce-vulnerability
 * https://securityaffairs.co/wordpress/125450/malware/dark-mirai-botnet-tp-link.html
 * https://www.bleepingcomputer.com/news/security/dark-mirai-botnet-targeting-rce-on-popular-tp-link-router/
 * https://www.inforisktoday.com/new-mirai-based-campaign-targets-unpatched-tp-link-router-a-18098?utm_source=LinkedIn&utm_medium=CollateralSM&utm_campaign=editorial_post
 * https://portswigger.net/daily-swig/pandora-monitoring-system-pwned-by-chained-vulnerability-exploit


PRESS (HUNGARIAN)

 * https://www.napi.hu/tech/tp-link-router-tech-kiberbunozes-hacker.754001.html
 * https://hvg.hu/tudomany/20220609_tp_link_router_sebezhetoseg_felhasznaloi_adatok_vedelme
 * https://24.hu/tech/2022/06/09/tp-link-tlwr840n-eu-v6-20-router-serulekenyseg-frissites-kpmg-matek-kamillo/
 * https://hvg.hu/tudomany/20211213_tp_link_router_tl_wr840n_sebezhetoseg_hacker_firmware
 * https://itbusiness.hu/technology/security_n/serulekeny-egy-nepszeru-lakossagi-wifi-router
 * https://24.hu/tech/2021/12/13/tp-link-tl-wr840n-router-serulekenyseg-frissites-manga-dark-kpmg/
 * https://virusirto.hu/blogbejegyzesek/2021/12/10/tp-link-routerekbe-bujt-a-dark-mirai-botnet/
 * https://itbusiness.hu/technology/security_n/magyar-etikus-hacker-fedezte-fel-a-monitorozo-rendszer-kritikus-serulekenysegeit
 * https://www.napi.hu/tech/pandora-matek-kamillo-kpmg-kritikus-serulekenyseg-etikus-hacker.733702.html
 * https://biztonsagpiac.hu/magyar-etikus-hacker-talalt-sulyos-9-8-as-erossegu-serulekenyseget/


HACKERSULI (HUNGARIAN)

 * https://www.youtube.com/watch?v=fbyle0BPoHw

© 2019-2022 Kamilló Matek (<ᚫᛗIᛚᛚᛟ) All Rights Reserved