#codingvulnerabilities search results

Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to: 🔐Secure your code and open source components 📈Track, manage, and remediate at scale 💪Empower developers with training #CodingVulnerabilities #SecureCode #SecurityFirst

Codebashings's tweet image. A shocking 79% of code goes out with known vulnerabilities! That’s why you need Codebashing to:
🔐Secure your code and open source components 
📈Track, manage, and remediate at scale 
💪Empower developers with training

#CodingVulnerabilities #SecureCode #SecurityFirst

79% of code is shipped with known vulnerabilities. That’s why you need Codebashing to: 📈Gain full control and visibility 👨🏻‍🎓Identify areas that need improvement 💡Tailor secure code training to your needs #CodingVulnerabilities #Codebashing #FlexibleTrainingProgram


Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: hubs.ly/Q02mcMVN0

immersivelabs's tweet image. Interested in learning how to shore up exposure from #CodingVulnerabilities and prove #Resilience against #AppSec risks? 

Register for our March 7th webinar to learn how to build cyber capabilities across application development teams: 
hubs.ly/Q02mcMVN0

No results for "#codingvulnerabilities"

🤔Confused after collecting Subdomains. Then checkout this different types of Vulnerability checklist 👇 github.com/Az0x7/vulnerab… #bugbounty #bugbountytips #bughunting #penetrationtester #penetrationtesting #github

TheMsterDoctor1's tweet image. 🤔Confused after collecting Subdomains. Then checkout this different types of Vulnerability checklist  👇

github.com/Az0x7/vulnerab…

#bugbounty #bugbountytips #bughunting #penetrationtester #penetrationtesting #github

Digging up old path traversal vulnerabilities? 🕵️‍♂️ I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets: Github Tool: github.com/bughuntar/CVE-… #Cybersecurity #VulnerabilityScanner #BugBounty #bugbountytips #professor #the

bughuntar's tweet image. Digging up old path traversal vulnerabilities? 🕵️‍♂️

I built this scanner for CVE-2022-37122 to help you find these classic bugs on your authorized targets:

Github Tool: github.com/bughuntar/CVE-…

#Cybersecurity #VulnerabilityScanner #BugBounty  #bugbountytips #professor #the…

2.Bypass Tricks and exploitation methods #sqli #bugbounty

jsmonsh's tweet image. 2.Bypass Tricks and exploitation methods

#sqli #bugbounty

Hackers 🔥 This code is from an unpatched WordPress plugin 🤯 Can you see the vulnerability? 🔎

chux13786509's tweet image. Hackers 🔥
This code is from an unpatched WordPress plugin 🤯
Can you see the vulnerability? 🔎

.@AlmanaxAI just released its latest cybersecurity evals! This is a comprehensive review of how different AI models compare at detection of code vulnerabilities. We also evaluated popular signature-based static analyzers. Here's what we found 👇🏽

francescpicc's tweet image. .@AlmanaxAI just released its latest cybersecurity evals!

This is a comprehensive review of how different AI models compare at detection of code vulnerabilities. We also evaluated popular signature-based static analyzers.

Here's what we found 👇🏽

🔥Find critical vulnerabilities in js files✨ Looks inside this JS files: 🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base Read the full method 👇🏼 t.me/ShellSec/176

darkshadow2bd's tweet image. 🔥Find critical vulnerabilities in js files✨
Looks inside this JS files:

🔍main, app, runtime, bundle, polyfills, auth, config, settings, local, dev, data, api, session, user,core, client, server, utils, base
Read the full method 👇🏼 t.me/ShellSec/176

Since you guys are liking the concept of vulnerable code snippets, with help of some talented folks, we have a pool of vulnerable code snippets! Python ninjas, find the bug in the code! Code By: @ChetanyaKunndra #appsec #Python #infosecurity #codereview #bugbountytips

harshbothra_'s tweet image. Since you guys are liking the concept of vulnerable code snippets, with help of some talented folks, we have a pool of vulnerable code snippets! 

Python ninjas, find the bug in the code! 

Code By: @ChetanyaKunndra 

#appsec #Python #infosecurity #codereview #bugbountytips

CVE-2020-17530: Apache Struts2 Remote Code Execution Vulnerability Alert github.com/ka1n4t/CVE-202…

cyber_advising's tweet image. CVE-2020-17530: Apache Struts2 Remote Code Execution Vulnerability Alert
github.com/ka1n4t/CVE-202…

Hackers 🔥 Would you say that this code is secured from path traversal attacks?🤔

chux13786509's tweet image. Hackers 🔥
Would you say that this code is secured from path traversal attacks?🤔

Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔

chux13786509's tweet image. Hackers 🔥
This code contains at least 2 serious vulnerabilities.
Can you spot them? 😋
What would be your exploit? 🤔

Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

developer_ali15's tweet image. Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

This software engineer was nearly hacked by a coding interview. I've never seen this attack channel before. Be careful out there, especially vibe coders.

deedydas's tweet image. This software engineer was nearly hacked by a coding interview. 

I've never seen this attack channel before. Be careful out there, especially vibe coders.

Bad binder(CVE-2019-2215) exploit on x86_64 Android github.com/ameetsaahu/Ker…

ameetsaahu's tweet image. Bad binder(CVE-2019-2215) exploit on x86_64 Android
github.com/ameetsaahu/Ker…

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->

POC A public collection of POCs & Exploits for the vulnerabilities I discovered github.com/jhftss/POC t.me/hackgit/7436

hack_git's tweet image. POC

A public collection of POCs & Exploits for the vulnerabilities I discovered

github.com/jhftss/POC t.me/hackgit/7436

Can you spot the XSS vulnerability here? 🧐

intigriti's tweet image. Can you spot the XSS vulnerability here? 🧐

Bypassing content-security-policy (CSP) of a targeted website by hiding malicious #JavaScript library inside a PNG image posted on Twitter. Nice read > secjuice.com/hiding-javascr… via @Menin_TheMiddle

TheHackersNews's tweet image. Bypassing content-security-policy (CSP) of a targeted website by hiding malicious #JavaScript library inside a PNG image posted on Twitter.

Nice read > secjuice.com/hiding-javascr…

via @Menin_TheMiddle

🔍Can you find the vuln? (This was from a 2024 exploit.)

0x158_'s tweet image. 🔍Can you find the vuln?
(This was from a 2024 exploit.)

Top 10 exploited vulnerabilities in 2022. 🧵👇 #bugbounty #infosec #cybersecurity #CVE #hacking

thebinarybot's tweet image. Top 10 exploited vulnerabilities in 2022.

🧵👇

#bugbounty #infosec #cybersecurity #CVE #hacking

Loading...

Something went wrong.


Something went wrong.


United States Trends