d4rk_c0r3's profile picture. ok....

d4rk_c0r3

@d4rk_c0r3

ok....

d4rk_c0r3 reposted

Search for all leaked keys/secrets using one regex! regex: gist.github.com/h4x0r-dz/be69c… #BugBounty #bugbountytip

h4x0r_dz's tweet image. Search for all leaked keys/secrets using one regex! 

regex: gist.github.com/h4x0r-dz/be69c…

#BugBounty #bugbountytip

d4rk_c0r3 reposted

CloudRip Fast Cloudflare bypass scanner Find real server IPs behind Cloudflare by scanning subdomains. Multi-threaded for speed, skips Cloudflare-owned IPs, supports custom or built-in wordlists, and exports results. Built-in rate limiting to avoid getting blocked REPO ⤵️

_0b1d1's tweet image. CloudRip Fast Cloudflare bypass scanner

Find real server IPs behind Cloudflare by scanning subdomains. Multi-threaded for speed, skips Cloudflare-owned IPs, supports custom or built-in wordlists, and exports results. Built-in rate limiting to avoid getting blocked 
REPO ⤵️

d4rk_c0r3 reposted

🚀 sandmap Nmap on steroids. Simple CLI with the ability to run pure Nmap engine, 31 modules with 459 scan profiles. github.com/trimstray/sand…


d4rk_c0r3 reposted

Arctic Wolf Labs reports that the China-linked threat actor UNC6384 targeted European diplomatic entities in Hungary and Belgium during September and October 2025, exploiting ZDI-CAN-25373 and deploying PlugX RAT malware. arcticwolf.com/resources/blog…

virusbtn's tweet image. Arctic Wolf Labs reports that the China-linked threat actor UNC6384 targeted European diplomatic entities in Hungary and Belgium during September and October 2025, exploiting ZDI-CAN-25373 and deploying PlugX RAT malware. arcticwolf.com/resources/blog…

d4rk_c0r3 reposted

These three extensions will definitely help and save you time during your bug hunting process: Fake Filler, Code Formatter: js, css, json


d4rk_c0r3 reposted

Becoming a Security Researcher with @4osp3l as my mentor — Day 22 - I haven’t been feeling, but I still managed to read the web hacking recon from Vivkie’s bug bounty book and practiced on a real platform. I also went through a Medium posts to see how other hunters do recon

MRM_Cyber's tweet image. Becoming a Security Researcher with @4osp3l as my mentor — Day 22

- I haven’t been feeling, but I still managed to read the web hacking recon from Vivkie’s bug bounty book and practiced on a real platform. I also went through a Medium posts to see how other hunters do recon
MRM_Cyber's tweet image. Becoming a Security Researcher with @4osp3l as my mentor — Day 22

- I haven’t been feeling, but I still managed to read the web hacking recon from Vivkie’s bug bounty book and practiced on a real platform. I also went through a Medium posts to see how other hunters do recon

d4rk_c0r3 reposted

⚠️⚠️ CVE-2025-12463 — critical unauthenticated SQLi (CVSS 9.8) in Geutebruck G-Cam E-Series 🎯1.9k+ Results are found on the en.fofa.info nearly year. 🔗FOFA Link: en.fofa.info/result?qbase64… FOFA Query: app="GEUTEBRUCK" 🔖Refer: blog.blacklanternsecurity.com/p/cve-2025-124… #OSINT #FOFA

fofabot's tweet image. ⚠️⚠️ CVE-2025-12463 — critical unauthenticated SQLi (CVSS 9.8) in Geutebruck G-Cam E-Series
🎯1.9k+ Results are found on the en.fofa.info nearly year.
🔗FOFA Link: en.fofa.info/result?qbase64…
FOFA Query: app="GEUTEBRUCK"
🔖Refer: blog.blacklanternsecurity.com/p/cve-2025-124…
#OSINT #FOFA…

d4rk_c0r3 reposted

GitHub - rix4uni/originiphunter: A powerful Go tool for finding origin IPs of domains by querying multiple security APIs and validating results with built-in HTTP client. github.com/rix4uni/origin…


d4rk_c0r3 reposted

A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery github.com/Invicti-Securi…

harshleenchawl2's tweet image. A smarter web fuzzing tool that combines local LLM models and ffuf to optimize directory and file discovery
github.com/Invicti-Securi…

d4rk_c0r3 reposted

Hell nahh..Check this out all🔥you will enjoy it <33 Full Admin pannel access via this simple methodology..


d4rk_c0r3 reposted

🚩 Master the Art of CTFs: The Ultimate Cybersecurity Cheatsheet 💻⚡ Capture The Flag (CTF) challenges are one of the fastest ways to build real, hands-on hacking skills and this cheatsheet is designed to take you from beginner to expert

_0b1d1's tweet image. 🚩 Master the Art of CTFs: The Ultimate Cybersecurity Cheatsheet 💻⚡
Capture The Flag (CTF) challenges are one of the fastest ways to build real, hands-on hacking skills  and this cheatsheet is designed to take you from beginner to expert

d4rk_c0r3 reposted

GitHub - rix4uni/emailextractor: High-speed Go email scraper that crawls sites and internal links concurrently to collect email addresses for reconnaissance, research, or sales intelligence. github.com/rix4uni/emaile…


d4rk_c0r3 reposted

New research blog: We identified a stealthy multi-stage campaign, Operation #SkyCloak, targeting Russian & Belarusian military personnel Attack uses PowerShell infection with #Tor obfs4 bridges to expose RDP, SMB, SSH for persistent remote access #APT #OpenSSH #Malware #NetFlow

PrakkiSathwik's tweet image. New research blog: We identified a stealthy multi-stage campaign, Operation #SkyCloak, targeting Russian &amp;amp; Belarusian military personnel

Attack uses PowerShell infection with #Tor obfs4 bridges to expose RDP, SMB, SSH for persistent remote access

#APT #OpenSSH #Malware #NetFlow

d4rk_c0r3 reposted

This Google Dork Exposes Internal Test Environments 🔥 inurl:test | inurl:env | inurl:dev | inurl:staging | inurl:sandbox | inurl:debug | inurl:temp | inurl:internal | inurl:demo site:example[.]com #BugBounty #BugBountyTips #CyberSecurity #Pentesting #EthicalHacking #Hacking

Yass1nMohamed's tweet image. This Google Dork Exposes Internal Test Environments 🔥

inurl:test | inurl:env | inurl:dev | inurl:staging | inurl:sandbox | inurl:debug | inurl:temp | inurl:internal | inurl:demo site:example[.]com

#BugBounty #BugBountyTips #CyberSecurity #Pentesting #EthicalHacking #Hacking

d4rk_c0r3 reposted

Web Application Penetration Testing Checklist👾 Credits: @e11i0t_4lders0n 🔗alike-lantern-72d.notion.site/Web-Applicatio…

harshleenchawl2's tweet image. Web Application Penetration Testing Checklist👾
Credits: @e11i0t_4lders0n 
🔗alike-lantern-72d.notion.site/Web-Applicatio…

d4rk_c0r3 reposted

GitHub - Matrix-Community-ORG/SSHCracker: A powerful (SSH Cracker) and efficient SSH connection testing tool written in Go. Features include multi-threaded testing, real-time progress monitoring, Discord webhook integration, and a robust license system. github.com/Matrix-Communi…


d4rk_c0r3 reposted

🚨 CVE-2023-2437 - critical 🚨 UserPro <= 5.1.1 - Authentication Bypass > The UserPro plugin for WordPress through 5.1.1 allows authentication bypass via the u... 👾 cloud.projectdiscovery.io/library/CVE-20… @pdnuclei #NucleiTemplates #cve


d4rk_c0r3 reposted

⚠️⚠️ CVE-2025-10932: High 8.2/10 Vulnerability in MOVEit Transfer AS2 module (by Progress Software) — allows unauthorized data exposure or manipulation 🎯2.4k+ Results are found on the en.fofa.info nearly year. 🔗FOFA Link: en.fofa.info/result?qbase64… FOFA Query:…

fofabot's tweet image. ⚠️⚠️ CVE-2025-10932: High 8.2/10 Vulnerability in MOVEit Transfer AS2 module (by Progress Software) — allows unauthorized data exposure or manipulation
🎯2.4k+ Results are found on the en.fofa.info nearly year.
🔗FOFA Link: en.fofa.info/result?qbase64…
FOFA Query:…

Loading...

Something went wrong.


Something went wrong.