#exploit 검색 결과

Bug Bounty tips 👀 New WAF Bypass Discovered - Akamai & Cloudflare 🔥 A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare. #Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

viehgroup's tweet image. Bug Bounty tips 👀
New WAF Bypass Discovered - Akamai & Cloudflare 🔥

A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare.

#Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

Demostración de cómo explotar una vulnerabilidad de forma manual y después crear un exploit que automatice el proceso. #ciberseguridad #linux #exploit #Pentesting


#Cybersecurity #Exploit 😂😂😂😂😂😂😂😂😂

AnonOzzyDude's tweet image. #Cybersecurity #Exploit 😂😂😂😂😂😂😂😂😂

Windows & Active Directory Exploitation Cheat Sheet and Command Reference casvancooten.com/posts/2020/11/… #ActiveDirectory #Exploit

5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit
5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit

WAIT WHAT?! 😳 The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony. The exploit is in Sony’s hands now. Once patched… it could be public. Tick… tock… ⏳ #PS4Jailbreak #PS4 #Exploit #bdj

RobinsonPauli18's tweet image. WAIT WHAT?! 😳 
The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony.
The exploit is in Sony’s hands now. Once patched… it could be public.
Tick… tock… ⏳

#PS4Jailbreak #PS4 #Exploit #bdj

#exploit Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W mrt4ntr4.github.io/Windows-Heap-E… ]-> PoC - github.com/mrT4ntr4/Chall… // vulnerability exists in the add/update function where it re-uses the previous size of the record to read the new data


CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣 🔴 TIPO: SQLI + RCE 🔍 DORK (Zoomeye): app="FortiWeb WAF" 💣 EXPLOIT: github.com/watchtowrlabs/… #rce #github #exploit #sqli

TodayCyberNews's tweet image. CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣

🔴 TIPO: SQLI + RCE
🔍 DORK (Zoomeye):

app="FortiWeb WAF"

💣 EXPLOIT:
github.com/watchtowrlabs/…

#rce #github #exploit #sqli

🧨 Private Virus Spreader Binder #Exploit Surfaces 🧨 A member of a #Darkweb forum allegedly shared the Latest Version of a Private Virus Spreader Binder #Exploit. ⚠️ Handle with caution — potential weaponized tool circulating in underground markets. #CyberSecurity #Malware

cyberfeeddigest's tweet image. 🧨 Private Virus Spreader Binder #Exploit Surfaces 🧨

A member of a #Darkweb forum allegedly shared the Latest Version of a Private Virus Spreader Binder #Exploit. ⚠️ Handle with caution — potential weaponized tool circulating in underground markets. #CyberSecurity #Malware

Do the right thing…. #Exploit #bounty

To whoever took the funds from the Shibarium bridge — I want to speak to you not with anger, but with honesty. What you did shook people. Real people — not just wallets on a screen. Families, believers, builders who poured their time and hope into this project are now hurting…



Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



FiberGateway GR241AG - Full Exploit Chain - r0ny.net/FiberGateway-G… #IoT #Exploit #infosec #forensic

Din3zh's tweet image. FiberGateway GR241AG - Full Exploit Chain - r0ny.net/FiberGateway-G… #IoT #Exploit #infosec #forensic
Din3zh's tweet image. FiberGateway GR241AG - Full Exploit Chain - r0ny.net/FiberGateway-G… #IoT #Exploit #infosec #forensic

CVE-2025-8088: WinRAR ‘ExtractFile()’ path traversal bug allows evil .rar to drop payload in Startup → full RCE. Full Article: nullsecurityx.codes/cve-2025-8088-… DEMO: #BugBounty #rce #exploit #WinRAR

💀 CVE-2025-8088: WinRAR ‘ExtractFile()’ path traversal bug allows evil .rar to drop payload in Startup → full RCE. PoC: evil.rar → ../../../../Start Menu/Programs/Startup/evil.bat Fix & details: nullsecurityx.codes/cve-2025-8088-… #Infosec #WinRAR #CVE2025 #BugBounty



#exploit #AppSec #Threat_Research 1⃣ Zimbra Exploit Analysis (CVE-2025-27915) strikeready.com/blog/0day-ics-… // These exploits take advantage of .ics files to breach vulnerable systems 2⃣ Notepad++ DLL Hijacking (CVE-2025-56383) github.com/zer0t0/CVE-202… // If the threat actor has the…


Take a closer Look #Shibarium BridgeExploiter #Web3 #Exploit #Bounty

Update: The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain: 1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 2. All known wallets…

buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…
buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…
buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…


We want answers‼️🔥🔥🔥 #Exploit #Web3

Unless you are in the conversations with the latest information about how Shibarium is going to make their holders whole, making posts about how Shibarium will survive, make it, strive, or reopen, while showing the legal binding agreements, stop posting. You're lying to everyone.…



2) This week's recap highlights a WhatsApp worm that spread rapidly, critical CVEs (like CVE-2021-1675), and an Oracle 0-Day exploit. The takeaway: zero-day exploits are increasingly used in attacks. #whatsapp #oracle #exploit #cybersecurity


#exploit Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W mrt4ntr4.github.io/Windows-Heap-E… ]-> PoC - github.com/mrT4ntr4/Chall… // vulnerability exists in the add/update function where it re-uses the previous size of the record to read the new data


Windows & Active Directory Exploitation Cheat Sheet and Command Reference casvancooten.com/posts/2020/11/… #ActiveDirectory #Exploit

5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit
5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit

Bug Bounty tips 👀 New WAF Bypass Discovered - Akamai & Cloudflare 🔥 A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare. #Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

viehgroup's tweet image. Bug Bounty tips 👀
New WAF Bypass Discovered - Akamai & Cloudflare 🔥

A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare.

#Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

#opendir hosting #Wordpress #exploit tools 174.138.78.15:8000 🇺🇸

sicehice's tweet image. #opendir hosting #Wordpress #exploit tools

174.138.78.15:8000 🇺🇸

Developed a PoC for exploiting CVE-2024-38653 (Ivanti Avalanche XXE). Credits to Lucas Millar (Trend Micro Security Research) for identifying the vulnerability. POC: github.com/D4mianWayne/PO… #poc #exploit #xxe

D4mianWayne's tweet image. Developed a PoC for exploiting CVE-2024-38653 (Ivanti Avalanche XXE). Credits to Lucas Millar (Trend Micro Security Research) for identifying the vulnerability. POC: github.com/D4mianWayne/PO…

#poc #exploit #xxe

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

WAIT WHAT?! 😳 The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony. The exploit is in Sony’s hands now. Once patched… it could be public. Tick… tock… ⏳ #PS4Jailbreak #PS4 #Exploit #bdj

RobinsonPauli18's tweet image. WAIT WHAT?! 😳 
The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony.
The exploit is in Sony’s hands now. Once patched… it could be public.
Tick… tock… ⏳

#PS4Jailbreak #PS4 #Exploit #bdj

昨晩もまたVRC! VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。 そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。 同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦

tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦

I released an Intercom exploit Identity Verification is not set up on the Intercom widget, allowing an attacker to impersonate a user and access their chat history. Reference: intercom.com/help/en/articl… Github Poc : github.com/MuhammadWaseem… #Intercom #Exploit #BugBounty

wgujjer11's tweet image. I released an Intercom exploit
Identity Verification is not set up on the Intercom widget, allowing an attacker to impersonate a user and access their chat history.
Reference:
intercom.com/help/en/articl…
Github Poc :
github.com/MuhammadWaseem…

#Intercom #Exploit #BugBounty

🚨 Dark Market Alert: India’s Illicit #Malware Bazaar 🚨 A site openly sells illegal tools: #Malware, #Exploit kits, #Crypters, cracked software & proxy access. Tools include: DcRat v1.0.7 EdgeGuard Stealer 4.0 Schwarze Sonne RAT 2.0 Zeus Botnet 2.1 EagleSpy V3 & SRC…

cyberfeeddigest's tweet image. 🚨 Dark Market Alert: India’s Illicit #Malware Bazaar 🚨

A site openly sells illegal tools:
#Malware, #Exploit kits, #Crypters, cracked software & proxy access.
Tools include:

DcRat v1.0.7

EdgeGuard Stealer 4.0

Schwarze Sonne RAT 2.0

Zeus Botnet 2.1

EagleSpy V3 & SRC…

🏔️ À seulement 26 ans, Constance Schaerer entre dans l’histoire en devenant la plus jeune alpiniste alsacienne à atteindre le sommet de l’Everest ! 🇲🇨 Un exploit hors norme, une inspiration pour toute une génération. Bravo ! 👏 #Everest #Fiertéalsacienne #Exploit @UnserLand

HelfrichMaxence's tweet image. 🏔️ À seulement 26 ans, Constance Schaerer entre dans l’histoire en devenant la plus jeune alpiniste alsacienne  à atteindre le sommet de l’Everest ! 🇲🇨

Un exploit hors norme, une inspiration pour toute une génération. Bravo ! 👏 #Everest #Fiertéalsacienne #Exploit @UnserLand

✨ Exploit incroyable ! ✨ Le FC93 élimine le @RedStarFC (Ligue 2) en @coupedefrance ! Score final : 2-2, victoire aux tirs au but 🎯⚽. Une performance héroïque qui marque l’histoire du club 👏🔥 #FC93 #CoupeDeFrance #Exploit @District93foot @LPIFF75

FC93officiel's tweet image. ✨ Exploit incroyable ! ✨ 

Le FC93 élimine le @RedStarFC (Ligue 2) en @coupedefrance ! 

Score final : 2-2, victoire aux tirs au but 🎯⚽. Une performance héroïque qui marque l’histoire du club 👏🔥 

#FC93 #CoupeDeFrance #Exploit @District93foot @LPIFF75

CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣 🔴 TIPO: SQLI + RCE 🔍 DORK (Zoomeye): app="FortiWeb WAF" 💣 EXPLOIT: github.com/watchtowrlabs/… #rce #github #exploit #sqli

TodayCyberNews's tweet image. CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣

🔴 TIPO: SQLI + RCE
🔍 DORK (Zoomeye):

app="FortiWeb WAF"

💣 EXPLOIT:
github.com/watchtowrlabs/…

#rce #github #exploit #sqli

github.com/MatheuZSecurit… CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection #github #exploit

HackingTeam777's tweet image. github.com/MatheuZSecurit…

CVE-2025-24799 Exploit: GLPI - Unauthenticated SQL Injection
#github #exploit

Exploit Development Series: Panic! At The Kernel - Token Stealing Payloads Revisited on Windows 10 x64 and Bypassing SMEP connormcgarr.github.io/x64-Kernel-She… #exploit #development #kernel

5mukx's tweet image. Exploit Development Series: Panic! At The Kernel - Token Stealing Payloads Revisited on Windows 10 x64 and Bypassing SMEP

connormcgarr.github.io/x64-Kernel-She…

#exploit #development #kernel

Loading...

Something went wrong.


Something went wrong.


United States Trends