Twitter | Search | |
Search Refresh
SWARMNETICS 9m
Discover hard-to-find vulnerabilities by your own system before the bad guys do with our hybrid outsourced and approach.
Reply Retweet Like
Hacking & PenTest Videos 2h
Installing Metasploitable 2 In VMware Player - Penetration Testing Lab Ep1
Reply Retweet Like
Lord Deruyter Jun 5
Reply Retweet Like
Windows CLI gems Jun 17
script to fetch missing updates PS C:\> (New-Object -ComObject microsoft.update.session).CreateUpdateSearcher().Search("IsHidden=0 and IsInstalled=0").Updates | select Title,RebootRequired,CVEIds,IsMandatory
Reply Retweet Like
Good Guy Jun 30
Stasi Secret Service Tools Love the history here. Photos of the tools are super cool. No wonder the EU has some great locks. Hit the translate on your browser.
Reply Retweet Like
GMSecTec 16h
After a conversation with a pen tester 😲
Reply Retweet Like
ꙅꙅɘlɘmɒͶ Apr 17
Reply Retweet Like
Florian Hansemann Jul 9
Windows Privilege Escalation Guide
Reply Retweet Like
Hacking & PenTest Videos 9h
Building A Rugged Robot With Glytch - Hak5 2526
Reply Retweet Like
STÖK Jun 22
VIM tutorial: linux terminal tools for bug bounty pentest and redteams with
Reply Retweet Like
kmkz Jul 4
Gaining access on an external engagement through spear-phishing
Reply Retweet Like
Santosh Jun 7
Reply Retweet Like
Rishiraj Sharma Apr 13
SwiftnessX - an opensource note-taking app for pentesters, now available for macOS with v0.2 update. Download here:
Reply Retweet Like
HackerOnTwoWheels May 30
Exploiting File Uploads – MIME Sniffing to Stored XSS First / write up blog post. 😄
Reply Retweet Like
Amit Dubey Jul 7
Burp suite extensions which I found quite useful - 1. ActiveScan++ 2. Knife () 3. SSLScan 4. AutoRepeater 5. Software Vulnerability Scanner 6. Logger++ 7. ErrorMessageCheck Suggestions are welcome :)
Reply Retweet Like
BuneeFlacs Jul 6
Passed Pentest+ Today!! you're NEXT!!
Reply Retweet Like
Swissky🧙‍♂️ Jun 22
Ever wonder what to do with /graphql endpoint ? Use GraphQLmap :)
Reply Retweet Like
STÖK Jun 29
🔥 Burp Suite tutorial: IDOR vulnerability automation using Autorize and AutoRepeater (bug bounty) with by the community for the community!
Reply Retweet Like
Florian Hansemann Jul 15
Advanced Exploitation of SQL Injection to get Remote Code Execution
Reply Retweet Like
Michael Fisher May 11
Reply Retweet Like