thesecurebinary's profile picture. Information Security Company | App Sec • Red Teaming • Digital Forensics

SecureBinary

@thesecurebinary

Information Security Company | App Sec • Red Teaming • Digital Forensics

مثبتة

we #SecureBinary your assured cyber arm 💪 Thread 🧵 securebinary.in

thesecurebinary's tweet image. we #SecureBinary your assured cyber arm 💪
Thread 🧵

securebinary.in

SecureBinary أعاد

Bounties that are split with the hackforgood user on H1 will now go to help people in Türkiye and Syria. hackerone.com/hackforgood


SecureBinary أعاد

Great chance for all of us to do good thing for our peoples in Türkiye and Syria Due to the earthquakes a lot of people lost there life lost there home lost there families Thanks @Hacker0x01 for this i hope @Bugcrowd also will do the same

Bounties that are split with the hackforgood user on H1 will now go to help people in Türkiye and Syria. hackerone.com/hackforgood



May the magic and joy of the holiday season fill your heart and home with love and laughter. Team SecureBinary wishes you and your loved ones a very Merry Christmas and a Happy New Year.

thesecurebinary's tweet image. May the magic and joy of the holiday season fill your heart and home with love and laughter. Team SecureBinary wishes you and your loved ones a very Merry Christmas and a Happy New Year.

SecureBinary أعاد

I'm really addicted to ChatGPT. Maybe I will finally complete the last step of becoming a YouTuber - releasing a song.

LiveOverflow's tweet image. I'm really addicted to ChatGPT. Maybe I will finally complete the last step of becoming a YouTuber - releasing a song.

SecureBinary أعاد

☃️Awesome Bug Bounty Tools☃️ A curated list of various bug bounty tools for: ➡️ Recon ➡️ Exploitation and much more... #bugbounty #pentesting #tools #infosec #cybersecurity

thebinarybot's tweet image. ☃️Awesome Bug Bounty Tools☃️

A curated list of various bug bounty tools for:

➡️ Recon
➡️ Exploitation

and much more...

#bugbounty #pentesting #tools #infosec #cybersecurity

SecureBinary أعاد

Much like anything else, we #HACKED reporting! 😎 Here's a helpful template and guide to create the report for all your different #pentests: ✔️ Black box ✔️ White box ✔️Web application ✔️ Hardware Take a read of our #blog to learn more👇 bit.ly/3i3Np0y

hackthebox_eu's tweet image. Much like anything else, we #HACKED reporting! 😎
Here's a helpful template and guide to create the report for all your different #pentests:
✔️ Black box 
✔️ White box 
✔️Web application 
✔️ Hardware 
Take a read of our #blog to learn more👇
bit.ly/3i3Np0y

Hello Infosec People ! Check out our new project, our first red team tool written in Go. Introducing you to #o365sprayer An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services. github.com/securebinary/o…


SecureBinary أعاد

Thanks


SecureBinary أعاد

🛠️ firebaseExploiter A vulnerability discovery tool that discovers Firebase databases that are open and can be exploited Primarily built for mass hunting #bugbounty and #pentesting By @thesecurebinary github.com/securebinary/f…


SecureBinary أعاد

preview:


SecureBinary أعاد

Hello community 👋 Check out our new tool: github.com/securebinary/f… FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing.

thesecurebinary's tweet image. Hello community 👋
Check out our new tool:
github.com/securebinary/f…

FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily built for mass hunting bug bounties and for penetration testing.

SecureBinary أعاد

Introduction to Linux Heap Internals


SecureBinary أعاد

A lot has been said about removing hooks and kernel callbacks to stop an EDR from detecting malicious activity. What if we could terminate the process completely? Well ...we can. Check this out: spikysabra.gitbook.io/kernelcactus/


SecureBinary أعاد

SSRF seems like a simple vulnerability class but in reality, there are many variables. To see how are people really making money with them, I studied 124 bug bounty reports. From this video, you will learn which functionalities are most often vulnerable. youtu.be/0GxsUS1P5xs

gregxsunday's tweet card. What functionalities are vulnerable to SSRFs? Case study of 124 bug...

youtube.com

YouTube

What functionalities are vulnerable to SSRFs? Case study of 124 bug...


Loading...

Something went wrong.


Something went wrong.