#securityresearch search results

#MobileSecurity #SecurityResearch Bypassing Android System Library Integrity Checks! Learn how to defeat checks that flag your Frida hooks. We dive deep into system libraries memory modification techniques. Don't let integrity checks stop your research. youtu.be/8FZYmsDUj-c

SecFatal's tweet card. Bypass Integrity Checks for Android System Libraries

youtube.com

YouTube

Bypass Integrity Checks for Android System Libraries


⚡AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories. 🚨github.com/AggressiveUser… ✅Join Telegram For More - t.me/brutsecurity/1… #BugBounty #SecurityResearch #NucleiTemplates #AllForOne

wtf_brut's tweet image. ⚡AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories.

🚨github.com/AggressiveUser…
✅Join Telegram For More - t.me/brutsecurity/1…

#BugBounty #SecurityResearch #NucleiTemplates #AllForOne…

Book’s here, just in time for the holidays 😬 #securityresearch #bugbounty @spaceraccoonsec

drak3hft7's tweet image. Book’s here, just in time for the holidays 😬 #securityresearch #bugbounty @spaceraccoonsec

Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉 Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty

nvk0x's tweet image. Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉
Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty
nvk0x's tweet image. Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉
Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty

Thank you, @Apple ! 1/10 💃 @CoyEmerald1 Cybersecurity Specialist #SecurityResearch

CoyEmerald1's tweet image. Thank you, @Apple ! 

1/10 💃

@CoyEmerald1 
Cybersecurity Specialist 

#SecurityResearch
CoyEmerald1's tweet image. Thank you, @Apple ! 

1/10 💃

@CoyEmerald1 
Cybersecurity Specialist 

#SecurityResearch

🌐 Two months ago, we uncovered APT Sidewinder’s use of Netlify and Pages[.]dev hosting platforms to deploy phishing portals that impersonated government and defense agencies throughout South Asia. ⬇️ hunt.io/blog/apt-sidew… #MalwareAnalysis #SecurityResearch


Major breaches consistently expose cloud password manager failures. Local alternatives provide measurable advantages without corporate dependency. See the full video: youtu.be/uMDHPK-xyAA #DataBreach #InfoSec #SecurityResearch


You can hack the planet alone. But 𝐲𝐨𝐮 𝐜𝐚𝐧'𝐭 𝐝𝐞𝐟𝐞𝐧𝐝 𝐭𝐡𝐞 𝐩𝐥𝐚𝐧𝐞𝐭 𝐚𝐥𝐨𝐧𝐞. #VDP #BugBounty #SecurityResearch #Secrets

bnchandrapal's tweet image. You can hack the planet alone. But 𝐲𝐨𝐮 𝐜𝐚𝐧'𝐭 𝐝𝐞𝐟𝐞𝐧𝐝 𝐭𝐡𝐞 𝐩𝐥𝐚𝐧𝐞𝐭 𝐚𝐥𝐨𝐧𝐞.

#VDP #BugBounty #SecurityResearch #Secrets

can-i-take-over-xyz by @EdOverflow Explore subdomain takeover vulnerabilities & learn how to identify potential security issues. A helpful resource for security researchers! #SubdomainTakeover #SecurityResearch #BugBountyPrograms

D4Vinci1's tweet image. can-i-take-over-xyz by @EdOverflow

Explore subdomain takeover vulnerabilities & learn how to identify potential security issues. A helpful resource for security researchers! #SubdomainTakeover #SecurityResearch #BugBountyPrograms

🚨 The 1st issue of the #ARMADILLO project newsletter is out now. Discover our project’s vision, objectives, innovative solutions, pilot activities & latest news. Read now👉 armadillo-project.eu/ARMADILLO_NEWS… #HorizonEU #SecurityResearch


🔎 Advanced Google Search Techniques for Security Discovery Quick reference for defensive search operators to find publicly exposed assets, leaked configs, and accidental data exposures — use only for authorized research and remediation. #InfoSec #OSINT #SecurityResearch

Anastasis_King's tweet image. 🔎 Advanced Google Search Techniques for Security Discovery

Quick reference for defensive search operators to find publicly exposed assets, leaked configs, and accidental data exposures — use only for authorized research and remediation.

#InfoSec #OSINT #SecurityResearch

#HaxStroke #CyberAttack #SecurityResearch Military Networks presents 🗄 CyberRecog 🗄 Search Login and Password only by the URL. the CyberRecog system make fast search on big database to return your data. This all for free! ~HaxStroke cyberecog.militarynetworks.eu

haxstroke's tweet image. #HaxStroke
#CyberAttack 
#SecurityResearch

Military Networks presents 
🗄 CyberRecog 🗄

Search Login and Password only by the URL.

the CyberRecog system make fast search on big database to return your data.

This all for free!

~HaxStroke

cyberecog.militarynetworks.eu

Just randomly checked my Apple Security portal and realized I was awarded a bounty—$$$$ for reporting a security issue! Didn’t even notice the email from 3 weeks ago. #bugbounty #infosec #securityresearch

_anonysm's tweet image. Just randomly checked my Apple Security portal and realized I was awarded a bounty—$$$$ for reporting a security issue! Didn’t even notice the email from 3 weeks ago. 

#bugbounty #infosec #securityresearch

🚀 Two months ago, we uncovered the operation behind the malware loader known as #TinyLoader, which was found distributing crypto-theft tools across a global infrastructure. hunt.io/blog/tinyloade… #MalwareAnalysis #SecurityResearch


Today, we shift gears at #H16102 with Community Day! From knowledge-sharing to a special panel featuring @salesforce, HackerOne, and a top researcher—this is where relationships grow and innovation thrives. #LiveHackingEvents #SecurityResearch #Cybersecurity

Hacker0x01's tweet image. Today, we shift gears at #H16102 with Community Day!

From knowledge-sharing to a special panel featuring @salesforce, HackerOne, and a top researcher—this is where relationships grow and innovation thrives.

#LiveHackingEvents #SecurityResearch #Cybersecurity
Hacker0x01's tweet image. Today, we shift gears at #H16102 with Community Day!

From knowledge-sharing to a special panel featuring @salesforce, HackerOne, and a top researcher—this is where relationships grow and innovation thrives.

#LiveHackingEvents #SecurityResearch #Cybersecurity
Hacker0x01's tweet image. Today, we shift gears at #H16102 with Community Day!

From knowledge-sharing to a special panel featuring @salesforce, HackerOne, and a top researcher—this is where relationships grow and innovation thrives.

#LiveHackingEvents #SecurityResearch #Cybersecurity
Hacker0x01's tweet image. Today, we shift gears at #H16102 with Community Day!

From knowledge-sharing to a special panel featuring @salesforce, HackerOne, and a top researcher—this is where relationships grow and innovation thrives.

#LiveHackingEvents #SecurityResearch #Cybersecurity

Windows Admin-To-Kernel Elevation of Privilege (CVE-2024-21338) In our latest blog post, @biscoitomesmo details CVE-2024-21338 🔗 Read the full article here: hakaisecurity.io/cve-2024-21338… #WindowsVulnerability #SecurityResearch #PrivilegeEscalation #WindowsSecurity #CyberSecurity

HakaiOffsec's tweet image. Windows Admin-To-Kernel Elevation of Privilege (CVE-2024-21338)

In our latest blog post, @biscoitomesmo details CVE-2024-21338

🔗 Read the full article here: hakaisecurity.io/cve-2024-21338…

#WindowsVulnerability  #SecurityResearch #PrivilegeEscalation  #WindowsSecurity #CyberSecurity
HakaiOffsec's tweet image. Windows Admin-To-Kernel Elevation of Privilege (CVE-2024-21338)

In our latest blog post, @biscoitomesmo details CVE-2024-21338

🔗 Read the full article here: hakaisecurity.io/cve-2024-21338…

#WindowsVulnerability  #SecurityResearch #PrivilegeEscalation  #WindowsSecurity #CyberSecurity
HakaiOffsec's tweet image. Windows Admin-To-Kernel Elevation of Privilege (CVE-2024-21338)

In our latest blog post, @biscoitomesmo details CVE-2024-21338

🔗 Read the full article here: hakaisecurity.io/cve-2024-21338…

#WindowsVulnerability  #SecurityResearch #PrivilegeEscalation  #WindowsSecurity #CyberSecurity
HakaiOffsec's tweet image. Windows Admin-To-Kernel Elevation of Privilege (CVE-2024-21338)

In our latest blog post, @biscoitomesmo details CVE-2024-21338

🔗 Read the full article here: hakaisecurity.io/cve-2024-21338…

#WindowsVulnerability  #SecurityResearch #PrivilegeEscalation  #WindowsSecurity #CyberSecurity

#MobileSecurity #SecurityResearch Bypassing Android System Library Integrity Checks! Learn how to defeat checks that flag your Frida hooks. We dive deep into system libraries memory modification techniques. Don't let integrity checks stop your research. youtu.be/8FZYmsDUj-c

SecFatal's tweet card. Bypass Integrity Checks for Android System Libraries

youtube.com

YouTube

Bypass Integrity Checks for Android System Libraries


@grok you understand we SRs live on bugs right? we do bugs for a living, man! 🤣🤣 #web3security #securityresearch #whitehat #bugbounty


🔒🔍 Exciting news from Meta! Introducing WhatsApp Research Proxy to enhance security research and tackle potential threats. Stay ahead of the game! 🚀💻 #WhatsApp #SecurityResearch #BugBounty #StateActors 🛡️🔎 Source: thehackernews.com/2025/11/meta-e…


Navigating crypto taxes for 2025? 📊 Tools are key, but what's the *real* security risk in connecting your wallets? Stay vigilant! #CryptoTax #SecurityResearch 🔒 What's your biggest concern with these tools?


We’re proud to announce that not one – but two – of our team’s submissions were accepted to @DistrictCon! If you’re attending, stop by the Zetier table to meet us, talk #securityresearch, and hear more about the roles we’re actively hiring for as we continue to grow. #InfoSec

ZetierInc's tweet image. We’re proud to announce that not one – but two – of our team’s submissions were accepted to @DistrictCon! If you’re attending, stop by the Zetier table to meet us, talk #securityresearch, and hear more about the roles we’re actively hiring for as we continue to grow.

#InfoSec
ZetierInc's tweet image. We’re proud to announce that not one – but two – of our team’s submissions were accepted to @DistrictCon! If you’re attending, stop by the Zetier table to meet us, talk #securityresearch, and hear more about the roles we’re actively hiring for as we continue to grow.

#InfoSec

This was my first real RE project. I'm sure I made mistakes. If you're experienced in reverse engineering or security research, I'd love your feedback on my methodology. What should I tackle next to improve my skills? #InfoSec #CyberSecurity #SecurityResearch


⚡AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories. 🚨github.com/AggressiveUser… ✅Join Telegram For More - t.me/brutsecurity/1… #BugBounty #SecurityResearch #NucleiTemplates #AllForOne

wtf_brut's tweet image. ⚡AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories.

🚨github.com/AggressiveUser…
✅Join Telegram For More - t.me/brutsecurity/1…

#BugBounty #SecurityResearch #NucleiTemplates #AllForOne…

Digging deep often benefits us researchers. Thanks @SynackRedTeam #bugbounty #securityresearch

drak3hft7's tweet image. Digging deep often benefits us researchers. Thanks @SynackRedTeam #bugbounty #securityresearch

I'll provide additional details soon. Meanwhile, check out real-time DJI DroneID decoding with ANTSDR in this brief video. #securityresearch #sdr #djimini3pro youtube.com/shorts/1xshKGH…

cemaxecuter's tweet image. I'll provide additional details soon. Meanwhile, check out real-time DJI DroneID decoding with ANTSDR in this brief video. #securityresearch #sdr #djimini3pro 

youtube.com/shorts/1xshKGH…

Book’s here, just in time for the holidays 😬 #securityresearch #bugbounty @spaceraccoonsec

drak3hft7's tweet image. Book’s here, just in time for the holidays 😬 #securityresearch #bugbounty @spaceraccoonsec

After several months of assessments and interviews I’ve just accomplished one of my all time goal, becoming a Synack Red Team member. Thanks @SynackRedTeam #cybersecurity #bugbounty #securityresearch #synack #redteam

drak3hft7's tweet image. After several months of assessments and interviews I’ve just accomplished one of my all time goal, becoming a Synack Red Team member. 

Thanks @SynackRedTeam 

#cybersecurity #bugbounty #securityresearch #synack #redteam

Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉 Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty

nvk0x's tweet image. Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉
Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty
nvk0x's tweet image. Ranked #73 on @Microsoft MVR 2025 leaderboard 🎉
Huge thanks to MSRC & the community — swag level: 💯🚀 #SecurityResearch #MSRC #BugBounty

Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. github.com/Aegrah/PANIX #DetectionEngineering #SecurityResearch #Persistence #Linux #Security

RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security
RFGroenewoud's tweet image. Very excited to release PANIX, a highly flexible Linux persistence tool for security research and detection engineering. Test your security posture and learn about Linux persistence. 

github.com/Aegrah/PANIX

#DetectionEngineering #SecurityResearch #Persistence #Linux #Security

📡Time is running out for you to inspire the whole industry with your #securityresearch! ⚠️Call for Papers ends tonight 11:59 PM IST➡️ bit.ly/42FR5b5 #NullconGoa2023 #CFP #Infosec #Conference

nullcon's tweet image. 📡Time is running out for you to inspire the whole industry with your #securityresearch! 

⚠️Call for Papers ends tonight 11:59 PM IST➡️ bit.ly/42FR5b5

#NullconGoa2023 #CFP #Infosec #Conference

This feedback always helps to improve and is much appreciated. This vulnerability I marked has a big impact on the loss of PII of clinical patients. @Hacker0x01 #bugbounty #cybersecurity #securityresearch

drak3hft7's tweet image. This feedback always helps to improve and is much appreciated. This vulnerability I marked has a big impact on the loss of PII of clinical patients.

@Hacker0x01 

#bugbounty #cybersecurity #securityresearch

You can hack the planet alone. But 𝐲𝐨𝐮 𝐜𝐚𝐧'𝐭 𝐝𝐞𝐟𝐞𝐧𝐝 𝐭𝐡𝐞 𝐩𝐥𝐚𝐧𝐞𝐭 𝐚𝐥𝐨𝐧𝐞. #VDP #BugBounty #SecurityResearch #Secrets

bnchandrapal's tweet image. You can hack the planet alone. But 𝐲𝐨𝐮 𝐜𝐚𝐧'𝐭 𝐝𝐞𝐟𝐞𝐧𝐝 𝐭𝐡𝐞 𝐩𝐥𝐚𝐧𝐞𝐭 𝐚𝐥𝐨𝐧𝐞.

#VDP #BugBounty #SecurityResearch #Secrets

Thank you, @Apple ! 1/10 💃 @CoyEmerald1 Cybersecurity Specialist #SecurityResearch

CoyEmerald1's tweet image. Thank you, @Apple ! 

1/10 💃

@CoyEmerald1 
Cybersecurity Specialist 

#SecurityResearch
CoyEmerald1's tweet image. Thank you, @Apple ! 

1/10 💃

@CoyEmerald1 
Cybersecurity Specialist 

#SecurityResearch

can-i-take-over-xyz by @EdOverflow Explore subdomain takeover vulnerabilities & learn how to identify potential security issues. A helpful resource for security researchers! #SubdomainTakeover #SecurityResearch #BugBountyPrograms

D4Vinci1's tweet image. can-i-take-over-xyz by @EdOverflow

Explore subdomain takeover vulnerabilities & learn how to identify potential security issues. A helpful resource for security researchers! #SubdomainTakeover #SecurityResearch #BugBountyPrograms

What could possibly go wrong, if this code is actually implemented in a software solution you pentest? Correct answers only. 😌 #SecurityResearch #CyberSecurity

realcyberpanda's tweet image. What could possibly go wrong, if this code is actually implemented in a software solution you pentest?

Correct answers only. 😌
#SecurityResearch #CyberSecurity

#HaxStroke #CyberAttack #SecurityResearch Military Networks presents 🗄 CyberRecog 🗄 Search Login and Password only by the URL. the CyberRecog system make fast search on big database to return your data. This all for free! ~HaxStroke cyberecog.militarynetworks.eu

haxstroke's tweet image. #HaxStroke
#CyberAttack 
#SecurityResearch

Military Networks presents 
🗄 CyberRecog 🗄

Search Login and Password only by the URL.

the CyberRecog system make fast search on big database to return your data.

This all for free!

~HaxStroke

cyberecog.militarynetworks.eu

Loading...

Something went wrong.


Something went wrong.


United States Trends