#infosec Suchergebnisse

Data breach search engines for Penetration Testing and Threat Intelligence 📕 #infosec #cybersec #PenetrationTesting

0x0SojalSec's tweet image. Data breach search engines for Penetration Testing and Threat Intelligence 📕

#infosec #cybersec #PenetrationTesting

APK TOOL GUI Tools: easier for reverse engineering and Android pentesting - github.com/AndnixSH/APKTo… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. APK TOOL GUI Tools:  easier for reverse engineering and Android pentesting 

- github.com/AndnixSH/APKTo…

#infosec #cybersec #bugbountytips

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

ofjaaah's tweet image. Use NextJS? Recon ✨

A quick way to find "all" paths for Next.js websites:
DevTools->Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n'));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips

I was able to bypass rate limiting using this on mostly websites. #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips

"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. image by: win3zz #cybersec #BugBountytips #infosec

0x0SojalSec's tweet image. The payload contains &apos;|/???/\b**\h,&apos; which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. 

image by:  win3zz

#cybersec #BugBountytips #infosec

Day 13/100 🔥 Wrapped up Module 6: Digital Forensics & Incident Response + checkpoint + final exam on @CiscoNetAcad. It’s been an amazing ride through the Cyber Threat Management course! 💻 #SecFelix #CyberSecurity #InfoSec #BlueTeam @h4ruk7 @malik_cybersec @ireteeh @ife0x01

DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01

Advanced queries for SQL Injection of all types ✨ - github.com/kleiton0x00/Ad… #infosec #bugbountytips #cybersecurity

0x0SojalSec's tweet image. Advanced queries for SQL Injection of all types ✨

- github.com/kleiton0x00/Ad…

#infosec #bugbountytips #cybersecurity

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript:prompt(404)">XSS-Click</00>--%20// #CyberSecurity #InfoSec #BugBounty #XSS

bughuntar's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#CyberSecurity #InfoSec #BugBounty #XSS…

Who made this lol #cybersecurity #infosec

payloadartist's tweet image. Who made this lol

#cybersecurity #infosec

Cloudflare Workers proxy for IP rotation and URL redirection - github.com/MrTurvey/flare… HTTP pass-through proxies for unique IP rotation, similar to fireprox #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Cloudflare Workers proxy for IP rotation and URL redirection

- github.com/MrTurvey/flare…

HTTP pass-through proxies for unique IP rotation, similar to fireprox

#infosec #cybersec #bugbountytips

Novo malware ChaosBot usa Discord como centro de comando para invadir redes empresariais. Ataque sofisticado rouba credenciais VPN e explora contas privilegiadas. Nenhuma empresa está segura. #CyberSecurity #InfoSec


30-Day Bug Bounty Challenge #Day: [ 72 ] 🫟 Hanting : 2.40 h 📕 Study : 0 h 🕷️ Bugs reported: [ 0 ] + total bugs reported : [ 8 ] ========= #BugBounty #InfoSec #BugHunter #Recon

30-Day Bug Bounty Challenge #Day: [ 71 ] 🫟 Hanting : 4.15 h 📕 Study : 0 h 🕷️ Bugs reported: [ 1 ] + total bugs reported : [ 8 ] ========= الحمد لله رب العالمين لاقيت ثغرة idor. يا كرهي لها بس #BugBounty #InfoSec #BugHunter #Recon

Kai_Vritra's tweet image. 30-Day Bug Bounty Challenge

#Day: [ 71 ]
🫟 Hanting : 4.15 h 
📕 Study : 0 h 
🕷️ Bugs reported: [ 1 ]

+ total bugs reported : [ 8 ]

=========

الحمد لله رب العالمين لاقيت ثغرة idor.
يا كرهي لها بس 

#BugBounty
#InfoSec
#BugHunter 
#Recon


Several security issues were fixed in the Linux kernel. Ubuntu Security Notice USN77964 October 13, 2025 linuxazurefips vulnerabilities A security issue affects these releas... #Ubuntu #Linux #infosec #opensource #linuxsecurity tinyurl.com/28vonr9t

LS_Advisories's tweet image. Several security issues were fixed in the Linux kernel. Ubuntu Security Notice USN77964 October 13, 2025 linuxazurefips vulnerabilities A security issue affects these releas... #Ubuntu #Linux #infosec #opensource #linuxsecurity tinyurl.com/28vonr9t

Most critical bugs hide behind “low impact” endpoints. Don’t skip the boring ones — they often lead to full compromise #CyberSecurity #Infosec #CyberSec #Tips #bugbountytips #Bughunting #BugBounty


Ivanti Endpoint Manager Path Traversal RCE (CVE-2025-9713) A critical RCE via path traversal affects Ivanti Endpoint Manager. Exploitation is possible without authentication. Patch ASAP. For more details, read ZeroPath's blog on this vuln. #AppSec #Infosec #RCE


Logic Tampering via Protocol AbuseAn attacker intercepts commands over EtherNet/IP and alters setpoints on a pressure sensor—causing shock pressure and damaging equipment before operators notice. Read more 👉 lttr.ai/Ajx59 #Security #Infosec #OT


Data breach search engines for Penetration Testing and Threat Intelligence 📕 #infosec #cybersec #PenetrationTesting

0x0SojalSec's tweet image. Data breach search engines for Penetration Testing and Threat Intelligence 📕

#infosec #cybersec #PenetrationTesting

APK TOOL GUI Tools: easier for reverse engineering and Android pentesting - github.com/AndnixSH/APKTo… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. APK TOOL GUI Tools:  easier for reverse engineering and Android pentesting 

- github.com/AndnixSH/APKTo…

#infosec #cybersec #bugbountytips

Advanced queries for SQL Injection of all types ✨ - github.com/kleiton0x00/Ad… #infosec #bugbountytips #cybersecurity

0x0SojalSec's tweet image. Advanced queries for SQL Injection of all types ✨

- github.com/kleiton0x00/Ad…

#infosec #bugbountytips #cybersecurity

Cloudflare Workers proxy for IP rotation and URL redirection - github.com/MrTurvey/flare… HTTP pass-through proxies for unique IP rotation, similar to fireprox #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Cloudflare Workers proxy for IP rotation and URL redirection

- github.com/MrTurvey/flare…

HTTP pass-through proxies for unique IP rotation, similar to fireprox

#infosec #cybersec #bugbountytips

I was able to bypass rate limiting using this on mostly websites. #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips

Who made this lol #cybersecurity #infosec

payloadartist's tweet image. Who made this lol

#cybersecurity #infosec

Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr blog.infosectcbr.com.au/2025/08/01/exp… #infosec #embedded

0xor0ne's tweet image. Remote code execution exploit on the Synology TC500 smart camera by @infosectcbr

blog.infosectcbr.com.au/2025/08/01/exp…

#infosec #embedded

Vulnerabilities in automotive Memory Protection Unit (MPU) (CVE-2023-48010 and CVE-2024-33882) (2024) plaxidityx.com/blog/blog-post… #infosec

0xor0ne's tweet image. Vulnerabilities in automotive Memory Protection Unit (MPU) (CVE-2023-48010 and CVE-2024-33882) (2024)

plaxidityx.com/blog/blog-post…

#infosec

Day 13/100 🔥 Wrapped up Module 6: Digital Forensics & Incident Response + checkpoint + final exam on @CiscoNetAcad. It’s been an amazing ride through the Cyber Threat Management course! 💻 #SecFelix #CyberSecurity #InfoSec #BlueTeam @h4ruk7 @malik_cybersec @ireteeh @ife0x01

DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01
DefendWithFelix's tweet image. Day 13/100 🔥
Wrapped up Module 6: Digital Forensics &amp;amp; Incident Response + checkpoint + final exam on @CiscoNetAcad.
It’s been an amazing ride through the Cyber Threat Management course! 💻
#SecFelix #CyberSecurity #InfoSec #BlueTeam
@h4ruk7 @malik_cybersec @ireteeh @ife0x01

💡 Tip: Always use the FindSomething extension! You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities. #InfoSec #BugBounty #SecurityTips #AppSec

mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec

💡 Tip: always check .js files for Authorization: "Basic" You can often find unauthorized access and it can lead to critical bugs. #BugBounty #InfoSec #SecurityTips #InformationDisclosure

mooo_sec's tweet image. 💡 Tip: always check .js files for

 Authorization: &quot;Basic&quot; 

 You can often find unauthorized access and it can lead to critical bugs.

#BugBounty #InfoSec #SecurityTips #InformationDisclosure
mooo_sec's tweet image. 💡 Tip: always check .js files for

 Authorization: &quot;Basic&quot; 

 You can often find unauthorized access and it can lead to critical bugs.

#BugBounty #InfoSec #SecurityTips #InformationDisclosure

Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation github.com/0xor0ne/awesom… #infosec

0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec
0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec

Wyrm C2 v0.3 is officially released - bringing a web based GUI to the post exploitation framework! You can easily run the new GUI with docker, from the /client directory: docker compose up -d! Ezpz! github.com/0xflux/Wyrm #redteam #cyber #infosec #cybersecurity #computing

0xfluxsec's tweet image. Wyrm C2 v0.3 is officially released - bringing a web based GUI to the post exploitation framework! You can easily run the new GUI with docker, from the /client directory: docker compose up -d! Ezpz!

github.com/0xflux/Wyrm

#redteam #cyber #infosec #cybersecurity #computing…

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. image by: win3zz #cybersec #BugBountytips #infosec

0x0SojalSec's tweet image. The payload contains &apos;|/???/\b**\h,&apos; which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. 

image by:  win3zz

#cybersec #BugBountytips #infosec

this tool helped me get my first bounties! it’s very useful for turning huge, messy scope into actual findings. i'm putting it out there for everyone now. #bugbounty #recon #infosec #automation

phth0nus's tweet image. this tool helped me get my first bounties!
it’s very useful for turning huge, messy scope into actual findings. i&apos;m putting it out there for everyone now.
#bugbounty #recon #infosec #automation

Loading...

Something went wrong.


Something went wrong.


United States Trends