Saifulla_hacker's profile picture.

Saifullah Walid

@Saifulla_hacker

Saifullah Walid 님이 재게시함

The moment an occupation soldier attacked a Palestinian woman in Al-Aqsa Mosque this morning. #AlAqsaUnderAttack #Palestine


Saifullah Walid 님이 재게시함

Link Hijacked, Account Impersonated. It's Broken Link Hijacking (BLH). #cybersecuritytips #cybersecurity #ethicalhacking #bugbounty #bugbountytips #WebSecurity #Pentesting

cyb3rkh4l1d's tweet image. Link Hijacked, Account Impersonated. It's Broken Link Hijacking (BLH).

#cybersecuritytips #cybersecurity #ethicalhacking #bugbounty #bugbountytips #WebSecurity #Pentesting

Saifullah Walid 님이 재게시함

Blind XSS is kind of vulnerability that most hunters miss, This is my findings from hackerone public program inwhich I was able to takeover admin dashboard. Don't be a blind, blind XSS do exist #cybersecurity #bugbounty #infosec #infosecurity #Ethicalhacking #websecurity

cyb3rkh4l1d's tweet image. Blind XSS is kind of vulnerability that most hunters miss, This is my findings from hackerone public program inwhich I was able to takeover admin dashboard.

Don't be a blind, blind XSS do exist

#cybersecurity #bugbounty #infosec #infosecurity #Ethicalhacking #websecurity
cyb3rkh4l1d's tweet image. Blind XSS is kind of vulnerability that most hunters miss, This is my findings from hackerone public program inwhich I was able to takeover admin dashboard.

Don't be a blind, blind XSS do exist

#cybersecurity #bugbounty #infosec #infosecurity #Ethicalhacking #websecurity

Saifullah Walid 님이 재게시함

#Ramadan Kareem! We wish you all an inspiring and rewarding month.

Bugcrowd's tweet image. #Ramadan Kareem! We wish you all an inspiring and rewarding month.

Saifullah Walid 님이 재게시함

Finding Origin Ip behind waf using mail server #cybersecurity #cybersecuritytips #bugbountytips #bugbounty #infosec #infosecurity

cyb3rkh4l1d's tweet image. Finding Origin Ip behind waf using mail server

#cybersecurity #cybersecuritytips #bugbountytips #bugbounty #infosec #infosecurity

Saifullah Walid 님이 재게시함

[HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character. example: redirect_to=////evil%E3%80%82com  #bugbounty #hackertips #openredirect

YogoshaOfficial's tweet image. [HACKER TIP] If you are testing Open Redirect but there is a blacklisted character, you can test it with a chinese dot to bypass it or any other Unicode Character.
example:
redirect_to=////evil%E3%80%82com 
#bugbounty #hackertips #openredirect

Saifullah Walid 님이 재게시함

Understand the logic thoroughly, then circumvent the logic accordingly. Be patient, be sophisticated, be ethical.


Saifullah Walid 님이 재게시함

Top 30 React Projects for Beginners Thread🧵👇

JSAyushThakur's tweet image. Top 30 React Projects for Beginners

Thread🧵👇

Saifullah Walid 님이 재게시함

OAuth 2.o bug bounty mindsets #cybersecurity #infosec #Pentesting #ethicalhacking

cyb3rkh4l1d's tweet image. OAuth 2.o bug bounty mindsets

#cybersecurity #infosec #Pentesting #ethicalhacking

Saifullah Walid 님이 재게시함

New Writeup - Circumventing Browser Security Mechanisms For SSRF. In this blog post we find our way around browser's mixed content policy to perform a SSRF against headless Chrome. Ft. @S1r1u5_ @iamnoooob @rootxharsh httpvoid.com/?p=Circumventi…

httpvoid0x2f's tweet image. New Writeup - Circumventing Browser Security Mechanisms For SSRF. In this blog post we find our way around browser's mixed content policy to perform a SSRF against headless Chrome. Ft. @S1r1u5_ @iamnoooob @rootxharsh 

httpvoid.com/?p=Circumventi…

Saifullah Walid 님이 재게시함

Managing #safety remains a vital task in #construction, but it’s a job that involves heavy record-keeping and constant training for success. How 3 construction companies use #tech to improve safety ✅👉 resources.industrydive.com/how-three-cons… #RINNO #deeprenovation @constructdive

rinno_h2020's tweet image. Managing #safety remains a vital task in #construction, but it’s a job that involves heavy record-keeping and constant training for success.

How 3 construction companies use #tech to improve safety ✅👉 resources.industrydive.com/how-three-cons…

#RINNO #deeprenovation @constructdive

Saifullah Walid 님이 재게시함

How Server-Side request forgery(ssrf) works? #cybersecurity #infosec #infosecurity #ethicalhacking #Pentesting #CyberSec

cyb3rkh4l1d's tweet image. How Server-Side request forgery(ssrf) works?

#cybersecurity #infosec #infosecurity #ethicalhacking #Pentesting #CyberSec

Saifullah Walid 님이 재게시함

Blind SSRF vulnerabilities arise when an application can be induced to issue a back-end HTTP request to a supplied URL, but the response from the back-end request is not returned in the application's front-end response. #cybersecurity #infosec #ethicalhacking #infosecurity


Saifullah Walid 님이 재게시함

Nothing quite like a "Nice catch!" to make your day so much better 🥳

spaceraccoonsec's tweet image. Nothing quite like a "Nice catch!" to make your day so much better 🥳

Saifullah Walid 님이 재게시함

DLL hijacking is a method of injecting malicious code into an application by exploiting the way some Windows applications search and load Dynamic Link Libraries (DLL). #cybersecurity #CyberSec #infosec #infosecurity #Ethicalhacking #windows #redteam

cyb3rkh4l1d's tweet image. DLL hijacking is a method of injecting malicious code into an application by exploiting the way some Windows applications search and load Dynamic Link Libraries (DLL).

#cybersecurity #CyberSec #infosec #infosecurity #Ethicalhacking #windows #redteam

Saifullah Walid 님이 재게시함

Password reset poisoning is a technique whereby an attacker manipulates a vulnerable website into generating a password reset link pointing to a domain under their control. #cybersecurity #Ethicalhacking #Pentesting #infosecurity #CyberSec #WebSecurity

cyb3rkh4l1d's tweet image. Password reset poisoning is a technique whereby an attacker manipulates a vulnerable website into generating a password reset link pointing to a domain under their control.

#cybersecurity #Ethicalhacking #Pentesting #infosecurity #CyberSec #WebSecurity

Loading...

Something went wrong.


Something went wrong.