Twitter | Search | |
This is the legacy version of twitter.com. We will be shutting it down on 15 December 2020. Please switch to a supported browser or device. You can see a list of supported browsers in our Help Center.
Search Refresh
blueteamblog Nov 19
Cheat sheets for: • Wireshark • Linux • Windows CMD • NMAP + Nessus
Reply Retweet Like
Lütfü Mert Ceylan 8h
an XSS payload with Alert Obfuscation, for bypass RegEx filters <img src="X" onerror=top[8680439..toString(30)](1337)>
Reply Retweet Like
Narendra Bhati Nov 25
A Total of $20500 Awarded By Apple Security.
Reply Retweet Like
blueteamblog Nov 20
Cheat Sheets for: • Kali Linux • Metasploit • John the Ripper • nmap
Reply Retweet Like
HYPR Nov 23
Thankful for all the incredibly talented security practitioners working around the clock to keep their users safe.
Reply Retweet Like
Florian Hansemann Nov 20
Penetration Testing / OSCP Biggest Reference Bank - really huge list
Reply Retweet Like
US-CERT Nov 27
Immediately update Fortinet to mitigate a critical vulnerability.
Reply Retweet Like
InfosecMiles (looking for a job) Nov 25
I'm still looking for my first job. Remote or in Chicago or Northwest Indiana. 10+ years of IT experience; CySA+ certified; recently completed "Getting Started in Security with BHIS and MITRE ATT&CK w/ John Strand" training. I appreciate all the help everyone gives
Reply Retweet Like
Gentackle #StayHome Nov 24
With the lockdown surely you will have some time to rest. 🥺 Or maybe not 😹
Reply Retweet Like
blueteamblog Nov 21
“Blue Team Cheat Sheets” compiled by Chris Davis! 121 Pages 😮 of goodness about things like: • Networking / Blue Team Tools • Windows • Linux / Unix • Incident Response Situations • Incident Response Forms
Reply Retweet Like
Aditya Soni Nov 21
I just published my hacking experience on my First Bounty Target and also Disclosing Multiple Reports
Reply Retweet Like
Ranjan Nov 23
Hello All✨😎 I just published my first article on the VPS setup for Recon Automation. 🤗 Here's the link.🥳 This is for beginners who want setup their VPS and want to automate the Recon Process.🤗🥳
Reply Retweet Like
febinrev_👨‍💻💻🔭🔭 Nov 22
Some of my favorite CSRF protection bypasses : 1. Remove the CSRF token 2. Remove the token and the parameter from the request. 3. Register 2 users. Use one user's Csrf protection token, replace other user's token with it, send the request.
Reply Retweet Like
Sharik Khan Nov 25
Pizza Hunting while Bug Hunting!!!
Reply Retweet Like
Blue Team News Nov 26
Leonidas - Automated Attack Simulation In The Cloud, Complete With Detection Use Cases
Reply Retweet Like
Ptrace Security GmbH Nov 25
a recon tool that allows searching on URLs that are exposed via shortener services
Reply Retweet Like
The Hacker News Nov 25
A new two-factor authentication (2FA) bypass flaw reported in cPanel and WHM—popular web hosting administrative software. Details:
Reply Retweet Like
Alyssa Miller 23h
Hey , stop abdicating from responsibility for user behaviors. Learn how to educate non-security people using language they can identify with. Know your audience, enable them and motivate them. Yes that is part of your job if you're gonna work here.
Reply Retweet Like
maldevel ☣ Nov 23
Initial Access with Evil Calendar Files and GoPhish
Reply Retweet Like
Tyler Price Nov 23
Inspired by and , I developed an exploit for CVE-2020-9802 to achieve UXSS and the ability to install a service worker for iCloud Drive.
Reply Retweet Like

Related searches

#hacker · #bugbountytip · #cybersecurity · #osint · #hacking