254developer's profile picture. CyberSecurity Researcher | Pentester

cyberpunk

@254developer

CyberSecurity Researcher | Pentester

Just got a reward for a vulnerability submitted on @yeswehack -- HTML Injection (CWE-79). #YesWeRHackers


Just got a reward for a vulnerability submitted on @yeswehack -- Server-Side Request Forgery (SSRF) (CWE-918). #YesWeRHackers


cyberpunk reposted

🥇 FREE Certified AppSec Practitioner (CAP) exam! 🥇 ** No Discount Code Needed** To get the offer: 1. Retweet this post. 2. Fill this Google form - 📄 docs.google.com/forms/d/e/1FAI… 3. We will email you the exam details. 💯 🔗 Read more about our CAP exam - secops.group/pentesting-exa…

TheSecOpsGroup's tweet image. 🥇 FREE Certified AppSec Practitioner (CAP) exam! 🥇
** No Discount Code Needed**

To get the offer:
1. Retweet this post.
2. Fill this Google form -
📄 docs.google.com/forms/d/e/1FAI…
3. We will email you the exam details. 💯

🔗 Read more about our CAP exam -
secops.group/pentesting-exa……

cyberpunk reposted

Open Source Intelligence fuels cybersecurity teams, letting blue, purple and red teams access a wide range of information such as network technologies, web-hosting servers,DNS records,software technologies,cloud assets,IoT devices,apps,databases,social media accounts #CyberSec

kcsfa's tweet image. Open Source Intelligence fuels cybersecurity teams, letting blue, purple and red teams access a wide range of information such as network technologies, web-hosting servers,DNS records,software technologies,cloud assets,IoT devices,apps,databases,social media accounts #CyberSec

cyberpunk reposted

Bug Bounty Tips: 🐛🔐 Unlocking Important Resources with Email Verification Bypass Working on a target where email verification is crucial? Imagine a scenario where gaining access to a specific domain, like example[.]com, could grant you entry into a victim's workspace, allowing…

Jayesh25_'s tweet image. Bug Bounty Tips: 🐛🔐 Unlocking Important Resources with Email Verification Bypass

Working on a target where email verification is crucial? Imagine a scenario where gaining access to a specific domain, like example[.]com, could grant you entry into a victim's workspace, allowing…

cyberpunk reposted

Monitoring javascript files will always give you results. credit: @winteri3coming #bugbountytips #bugbounty

WllGates's tweet image. Monitoring javascript files will always give you results.

credit: @winteri3coming 

#bugbountytips #bugbounty

cyberpunk reposted

Security controls are measures or safeguards implemented to manage and mitigate the risk of security threats and vulnerabilities. #CyberSecurityAwareness #securitycontrols

kcsfa's tweet image. Security controls are measures or safeguards implemented to manage and mitigate the risk of security threats and vulnerabilities.
#CyberSecurityAwareness #securitycontrols

cyberpunk reposted

🤔Question of the day: What are the common vulnerabilities within the "Forgot Password" functionality? Many users tend to overlook testing the "Forgot Password" feature of a target app. However, these functions are often susceptible to various issues. If exploited, these issues…

Jayesh25_'s tweet image. 🤔Question of the day: What are the common vulnerabilities within the "Forgot Password" functionality?

Many users tend to overlook testing the "Forgot Password" feature of a target app. However, these functions are often susceptible to various issues. If exploited, these issues…

I have created a rubber ducky that gives you remote access to the target system. Find the scripts on my github. #CyberSecurity #networking #ethicalhacking #infosecurity #PenetrationTesting


I have just created a rubber ducky using my usb drive. #CyberSecurity


United States Trends

Loading...

Something went wrong.


Something went wrong.