#codingvulnerabilities نتائج البحث

Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to: 🔐Secure your code and open source components 📈Track, manage, and remediate at scale 💪Empower developers with training #CodingVulnerabilities #SecureCode #SecurityFirst

Codebashings's tweet image. A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to:
🔐Secure your code and open source components 
📈Track, manage, and remediate at scale 
💪Empower developers with training

#CodingVulnerabilities #SecureCode #SecurityFirst

79% of code is shipped with known vulnerabilities. That’s why you need Codebashing to: 📈Gain full control and visibility 👨🏻‍🎓Identify areas that need improvement 💡Tailor secure code training to your needs #CodingVulnerabilities #Codebashing #FlexibleTrainingProgram


Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

لا توجد نتائج لـ "#codingvulnerabilities"

🤔Confused after collecting Subdomains. Then checkout this different types of Vulnerability checklist 👇 github.com/Az0x7/vulnerab… #bugbounty #bugbountytips #bughunting #penetrationtester #penetrationtesting #github

TheMsterDoctor1's tweet image. 🤔Confused after collecting Subdomains. Then checkout this different types of Vulnerability checklist  👇

github.com/Az0x7/vulnerab…

#bugbounty #bugbountytips #bughunting #penetrationtester #penetrationtesting #github

Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔

chux13786509's tweet image. Hackers 🔥
This code contains at least 2 serious vulnerabilities.
Can you spot them? 😋
What would be your exploit? 🤔

2.Bypass Tricks and exploitation methods #sqli #bugbounty

jsmonsh's tweet image. 2.Bypass Tricks and exploitation methods

#sqli #bugbounty

Digging up old path traversal vulnerabilities? 🕵️‍♂️ I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets: Github Tool: github.com/bughuntar/CVE-… #Cybersecurity #VulnerabilityScanner #BugBounty #bugbountytips #professor #the

bughuntar's tweet image. Digging up old path traversal vulnerabilities? 🕵️‍♂️

I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets:

Github Tool: github.com/bughuntar/CVE-…

#Cybersecurity #VulnerabilityScanner #BugBounty  #bugbountytips #professor #the…

Hackers 🔥 This code is from an unpatched WordPress plugin 🤯 Can you see the vulnerability? 🔎

chux13786509's tweet image. Hackers 🔥
This code is from an unpatched WordPress plugin 🤯
Can you see the vulnerability? 🔎

🔥Find critical vulnerabilities in js files✨ Looks inside this JS files: 🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base Read the full method 👇🏼 t.me/ShellSec/176

darkshadow2bd's tweet image. 🔥Find critical vulnerabilities in js files✨
Looks inside this JS files:

🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base
Read the full method 👇🏼 t.me/ShellSec/176

Since you guys are liking the concept of vulnerable code snippets, with help of some talented folks, we have a pool of vulnerable code snippets! Python ninjas, find the bug in the code! Code By: @ChetanyaKunndra #appsec #Python #infosecurity #codereview #bugbountytips

harshbothra_'s tweet image. Since you guys are liking the concept of vulnerable code snippets, with help of some talented folks, we have a pool of vulnerable code snippets! 

Python ninjas, find the bug in the code! 

Code By: @ChetanyaKunndra 

#appsec #Python #infosecurity #codereview #bugbountytips

CVE-2020-17530: Apache Struts2 Remote Code Execution Vulnerability Alert github.com/ka1n4t/CVE-202…

cyber_advising's tweet image. CVE-2020-17530: Apache Struts2 Remote Code Execution Vulnerability Alert
github.com/ka1n4t/CVE-202…

Hackers 🔥 Would you say that this code is secured from path traversal attacks?🤔

chux13786509's tweet image. Hackers 🔥
Would you say that this code is secured from path traversal attacks?🤔

This software engineer was nearly hacked by a coding interview. I've never seen this attack channel before. Be careful out there, especially vibe coders.

deedydas's tweet image. This software engineer was nearly hacked by a coding interview. 

I've never seen this attack channel before. Be careful out there, especially vibe coders.

.@AlmanaxAI just released its latest cybersecurity evals! This is a comprehensive review of how different AI models compare at detection of code vulnerabilities. We also evaluated popular signature-based static analyzers. Here's what we found 👇🏽

francescpicc's tweet image. .@AlmanaxAI just released its latest cybersecurity evals!

This is a comprehensive review of how different AI models compare at detection of code vulnerabilities. We also evaluated popular signature-based static analyzers.

Here's what we found 👇🏽

Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

developer_ali15's tweet image. Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

My LLM analyzed a vulnerability in a Linux library and even created a PoC! This is expected to be used in Browser's Sandbox Escape as well. (Actually accessible) We will make this tool available for Android and browsers too! Actually my LLM was able to find several successful…

l33d0hyun's tweet image. My LLM analyzed a vulnerability in a Linux library and even created a PoC! This is expected to be used in Browser's Sandbox Escape as well. (Actually accessible)

We will make this tool available for Android and browsers too!

Actually my LLM was able to find several successful…

Bad binder(CVE-2019-2215) exploit on x86_64 Android github.com/ameetsaahu/Ker…

ameetsaahu's tweet image. Bad binder(CVE-2019-2215) exploit on x86_64 Android
github.com/ameetsaahu/Ker…

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->

POC A public collection of POCs & Exploits for the vulnerabilities I discovered github.com/jhftss/POC t.me/hackgit/7436

hack_git's tweet image. POC

A public collection of POCs & Exploits for the vulnerabilities I discovered

github.com/jhftss/POC t.me/hackgit/7436

I am proud to share the announcement about our CodeMender project at @GoogleDeepMind, an agent that can automatically fix a range of code security vulnerabilities. From only a modest-compute run, our agent submitted 72 high-quality fixes to vulnerable code in popular codebases,…

ralucaadapopa's tweet image. I am proud to share the announcement about our CodeMender project at @GoogleDeepMind, an agent that can automatically fix a range of code security vulnerabilities.  From only a modest-compute run, our agent submitted 72 high-quality fixes to vulnerable code in popular codebases,…

When you're writing code, sometimes you may not even know it's broken or vulnerable until something bad happens. So Manish wrote this guide to help you identify common issues that'll make your code less safe. He talks about missing input validation, poor error handling, no rate…

freeCodeCamp's tweet image. When you're writing code, sometimes you may not even know it's broken or vulnerable until something bad happens.

So Manish wrote this guide to help you identify common issues that'll make your code less safe.

He talks about missing input validation, poor error handling, no rate…

Bypassing content-security-policy (CSP) of a targeted website by hiding malicious #JavaScript library inside a PNG image posted on Twitter. Nice read > secjuice.com/hiding-javascr… via @Menin_TheMiddle

TheHackersNews's tweet image. Bypassing content-security-policy (CSP) of a targeted website by hiding malicious #JavaScript library inside a PNG image posted on Twitter.

Nice read > secjuice.com/hiding-javascr…

via @Menin_TheMiddle

Loading...

Something went wrong.


Something went wrong.


United States Trends