Bl4ckAc3Tech's profile picture.

Bl4ck Ac3

@Bl4ckAc3Tech

Repost di Bl4ck Ac3

HowToHunt is updated with some new resources and techniques check out: github.com/KathanP19/HowT… - Reverse Engineer an API by @offensivedroid - 2FA bypass method by @ome_mishra - GraphQL Resource .. and more Sorry guys for late update lots of new things going in life. 😅


Repost di Bl4ck Ac3

A lot of you guys were requesting Gitbook for HowToHunt. It took hell lot of work to arrange them 😓, hope so you like it, and make some pull request, what's left.🙂 Here you go: 🔥 kathan19.gitbook.io #bugbountytips #bugbounty #BugBountyTips


Repost di Bl4ck Ac3

Just released a brand new and free module on @hackinghub_io on SQL Injection with @BuildHackSecure! Check out the video walkthrough 👉🏼 youtu.be/EZXvxpbFqvg

NahamSec's tweet image. Just released a brand new and free module on @hackinghub_io on SQL Injection with @BuildHackSecure! 

Check out the video walkthrough 👉🏼 youtu.be/EZXvxpbFqvg

Repost di Bl4ck Ac3

🕵️Top 25 Recon Tools © Credit- ReconOne #bugbounty #bugbountytips

wtf_brut's tweet image. 🕵️Top 25 Recon Tools
© Credit- ReconOne

#bugbounty #bugbountytips

Repost di Bl4ck Ac3

After bug bounty for a while what should be the right direction to take?


Repost di Bl4ck Ac3

We're back with another post! #cybersecurity #pentesting

Questo tweet non è più disponibile.

Repost di Bl4ck Ac3

"I'm Black first. My sympathies are Black, my allegiance is Black, my objectives are Black." ~ Malcolm X

zoomafrika1's tweet image. "I'm Black first. My sympathies are Black, my allegiance is Black, my objectives are Black." ~ Malcolm X

Repost di Bl4ck Ac3

Discover more subdomains during your recon by extracting subdomains from TLS certificates. Integrate Cero into your recon automation for better results. github.com/glebarez/cero

m0uka_Dz's tweet image. Discover more subdomains during your recon by extracting subdomains from TLS certificates. Integrate Cero into your recon automation for better results.

github.com/glebarez/cero

Repost di Bl4ck Ac3

Overconfidence and excessive ego are always dangerous. Stay grounded, kids.

nav1n0x's tweet image. Overconfidence and excessive ego are always dangerous. Stay grounded, kids.

Repost di Bl4ck Ac3
kmcnam1's tweet image.

Repost di Bl4ck Ac3

Both me and @joohoi are big fans of the @BugBountyDEFCON village. Definitely Looking forward to see the growth of this space next year!

stokfredrik's tweet image. Both me and @joohoi are big fans of the @BugBountyDEFCON village. Definitely Looking forward to see the growth of this space next year!

Repost di Bl4ck Ac3

Let's connect to share learnings and hacking stuff


Repost di Bl4ck Ac3

We just realized that OCEANSIDE A is a frikkin huge room! Yall better get to our talk on Thursday when we drop our super sick tool certainly and present some really cool research around domain bitflippin spacelazer credential stealing shenanigans Pewpew blackhat.com/us-24/briefing…

stokfredrik's tweet image. We just realized that OCEANSIDE A is a frikkin huge room! Yall better get to our talk on Thursday when we drop our super sick tool certainly and present some really cool research around domain bitflippin spacelazer credential stealing shenanigans 
Pewpew

blackhat.com/us-24/briefing…

Repost di Bl4ck Ac3

Google Dork - Google Groups ⚙️ site:groups[.]google[.]com "example[.]com" Find juicy Endpoints for further testing 🎯 First saw this from @h4x0r_dz

TakSec's tweet image. Google Dork - Google Groups ⚙️

site:groups[.]google[.]com "example[.]com"

Find juicy Endpoints for further testing 🎯

First saw this from @h4x0r_dz

Repost di Bl4ck Ac3

Effective Subdomain Discovery Tips for Cybersecurity Professionals 1. Automate scans regularly. 2. Combine tools for comprehensive results. 3. Filter results based on risk levels. 4. Monitor for new or removed subdomains. 5. Manually verify critical subdomains. 6. Check for…


Repost di Bl4ck Ac3

🚀🚀 How to find RXSS in 5 minutes 🚀🚀 🧾 Credit - Ahmad Marzouk 1) subfinder -d target.com -all -o targets.txt *use subfinder with API Keys to extract a lot subdomains* 2) paramspider -l targets.txt 3) cat *.txt | kxss 4) Use this Payload to Bypass case…


Loading...

Something went wrong.


Something went wrong.