Twitter | Search | |
...
i just follow random people
1,531
Tweets
1,694
Following
132
Followers
Tweets
... retweeted
Stefano Vettorazzi May 15
You do not need to run 80 reconnaissance tools to get access to user accounts
Reply Retweet Like
... retweeted
Swissky🧙‍♂️ May 13
If you find any API key , check this amazing repo from to know how to use them 👏 !
Reply Retweet Like
... retweeted
STÖK May 14
Bash functions loops and conditions?! When in doubt, always :
Reply Retweet Like
... retweeted
SYNTAXERROR May 14
Reply Retweet Like
... retweeted
sandh0t May 14
I'm proud to share my first write-up, hope you enjoy it Think Outside the Scope: Advanced CORS Exploitation Techniques
Reply Retweet Like
... retweeted
Vinothkumar May 11
Github OSINT by ghostlulz
Reply Retweet Like
... retweeted
HAHWUL May 12
[ Four nmap NSE scripts for penetration testing. ] posted by by Hacking, Nmap, NSE, pentest
Reply Retweet Like
... retweeted
Faraz Khan May 12
Ever found any GIT or SVN File? heres an interesting read - Hidden directories and files as a source of sensitive information about web application by
Reply Retweet Like
... retweeted
Rafin Rahman Chy May 13
Prerequisites to Learn Web Application Penetration Testing * Basic Networking Concepts * Web Technologies * HTTP * Coding (e.g. HTML, CSS, Javascript, PHP, SQL, Python) * CMS (e.g. Wordpress, Joomla, Drupal) * Web Security Glossary
Reply Retweet Like
... retweeted
Raihan Biswas 🇨🇮 May 9
Reply Retweet Like
... retweeted
Emad Shanab May 9
My Guide to Basic Recon? | Bug Bounties + Recon | Amazing Love story.
Reply Retweet Like
... retweeted
Emad Shanab May 9
List of Recon methodology,Recon tools and Bug Bounty writeups.
Reply Retweet Like
... retweeted
Sh0ck May 9
Reply Retweet Like
... retweeted
Emad Shanab May 9
Reply Retweet Like
... retweeted
Emad Shanab May 9
Tools for:- Recon. Exploiting. Scanning. Fuzzing. Bruteforcing. Fingerprinting. Decompilers. Proxy plugins. Monitoring. JS Parsing. Mobile testing.
Reply Retweet Like
... retweeted
m0z May 9
When doing & subdomain enumeration, try port scanning all the subdomains you've found. It doesn't take too long and it'll reveal some hidden services to interact with! Take the path less travelled. :)
Reply Retweet Like
... retweeted
Emad Shanab May 9
“Web Services & API Pentesting-Part 1” by Asfiya Shaikh
Reply Retweet Like
... retweeted
Emad Shanab May 9
“SQL injection through User-Agent” by fr0stNuLL
Reply Retweet Like
... retweeted
Emad Shanab May 9
Reply Retweet Like
... retweeted
Emad Shanab May 9
Reply Retweet Like