Bug Bounty tips 👀 New WAF Bypass Discovered - Akamai & Cloudflare 🔥 A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare. #Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

viehgroup's tweet image. Bug Bounty tips 👀
New WAF Bypass Discovered - Akamai & Cloudflare 🔥

A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare.

#Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

Demostración de cómo explotar una vulnerabilidad de forma manual y después crear un exploit que automatice el proceso. #ciberseguridad #linux #exploit #Pentesting


Windows & Active Directory Exploitation Cheat Sheet and Command Reference casvancooten.com/posts/2020/11/… #ActiveDirectory #Exploit

5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit
5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit

WAIT WHAT?! 😳 The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony. The exploit is in Sony’s hands now. Once patched… it could be public. Tick… tock… ⏳ #PS4Jailbreak #PS4 #Exploit #bdj

RobinsonPauli18's tweet image. WAIT WHAT?! 😳 
The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony.
The exploit is in Sony’s hands now. Once patched… it could be public.
Tick… tock… ⏳

#PS4Jailbreak #PS4 #Exploit #bdj

CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣 🔴 TIPO: SQLI + RCE 🔍 DORK (Zoomeye): app="FortiWeb WAF" 💣 EXPLOIT: github.com/watchtowrlabs/… #rce #github #exploit #sqli

TodayCyberNews's tweet image. CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣

🔴 TIPO: SQLI + RCE
🔍 DORK (Zoomeye):

app="FortiWeb WAF"

💣 EXPLOIT:
github.com/watchtowrlabs/…

#rce #github #exploit #sqli

🧨 Private Virus Spreader Binder #Exploit Surfaces 🧨 A member of a #Darkweb forum allegedly shared the Latest Version of a Private Virus Spreader Binder #Exploit. ⚠️ Handle with caution — potential weaponized tool circulating in underground markets. #CyberSecurity #Malware

cyberfeeddigest's tweet image. 🧨 Private Virus Spreader Binder #Exploit Surfaces 🧨

A member of a #Darkweb forum allegedly shared the Latest Version of a Private Virus Spreader Binder #Exploit. ⚠️ Handle with caution — potential weaponized tool circulating in underground markets. #CyberSecurity #Malware

Do the right thing…. #Exploit #bounty

To whoever took the funds from the Shibarium bridge — I want to speak to you not with anger, but with honesty. What you did shook people. Real people — not just wallets on a screen. Families, believers, builders who poured their time and hope into this project are now hurting…



Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



#exploit Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W mrt4ntr4.github.io/Windows-Heap-E… ]-> PoC - github.com/mrT4ntr4/Chall… // vulnerability exists in the add/update function where it re-uses the previous size of the record to read the new data


Take a closer Look #Shibarium BridgeExploiter #Web3 #Exploit #Bounty

Update: The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain: 1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 2. All known wallets…

buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…
buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…
buzzdefi0x's tweet image. Update: 

The @K9finance DAO has performed the following on-chain actions in an attempt to make the bounty more visible on-chain:

1. All known wallets connected to the exploiter have been sent the same on-chain message as the original exploiter wallet 
2. All known wallets…


#exploit #AppSec #Threat_Research 1⃣ Zimbra Exploit Analysis (CVE-2025-27915) strikeready.com/blog/0day-ics-… // These exploits take advantage of .ics files to breach vulnerable systems 2⃣ Notepad++ DLL Hijacking (CVE-2025-56383) github.com/zer0t0/CVE-202… // If the threat actor has the…


We want answers‼️🔥🔥🔥 #Exploit #Web3

Unless you are in the conversations with the latest information about how Shibarium is going to make their holders whole, making posts about how Shibarium will survive, make it, strive, or reopen, while showing the legal binding agreements, stop posting. You're lying to everyone.…



اگه برای CVEها، دنبال اکسپلویت PoC هستید، این مخزن میتونه کمکتون کنه. github.com/0xMarcio/cve #CVE #Exploit #POC


#exploit #AppSec 1⃣ Dell UnityVSA Pre-Auth Command Injection (CVE-2025-36604) labs.watchtowr.com/its-never-simp… 2⃣ Authentication Bypass in the Rest API via XSS on Safari and Chrome (iOS/iPhone) bugcrowd.com/disclosures/d5… 3⃣ Arbitrary Code Execution in Android Unity Runtime…


2) This week's recap highlights a WhatsApp worm that spread rapidly, critical CVEs (like CVE-2021-1675), and an Oracle 0-Day exploit. The takeaway: zero-day exploits are increasingly used in attacks. #whatsapp #oracle #exploit #cybersecurity


#exploit Windows Heap Exploitation - From Heap Overflow to Arbitrary R/W mrt4ntr4.github.io/Windows-Heap-E… ]-> PoC - github.com/mrT4ntr4/Chall… // vulnerability exists in the add/update function where it re-uses the previous size of the record to read the new data


Bug Bounty tips 👀 New WAF Bypass Discovered - Akamai & Cloudflare 🔥 A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare. #Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

viehgroup's tweet image. Bug Bounty tips 👀
New WAF Bypass Discovered - Akamai & Cloudflare 🔥

A fresh technique has been spotted that successfully bypasses WAFs like Akamai and Cloudflare.

#Exploit #WAFBypass #XSS #Cloudflare #Akamai #WebSecurity #BugBounty #bugbountytips

Windows & Active Directory Exploitation Cheat Sheet and Command Reference casvancooten.com/posts/2020/11/… #ActiveDirectory #Exploit

5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit
5mukx's tweet image. Windows & Active Directory Exploitation Cheat Sheet and Command Reference

casvancooten.com/posts/2020/11/…

#ActiveDirectory #Exploit

#opendir hosting #Wordpress #exploit tools 174.138.78.15:8000 🇺🇸

sicehice's tweet image. #opendir hosting #Wordpress #exploit tools

174.138.78.15:8000 🇺🇸

Developed a PoC for exploiting CVE-2024-38653 (Ivanti Avalanche XXE). Credits to Lucas Millar (Trend Micro Security Research) for identifying the vulnerability. POC: github.com/D4mianWayne/PO… #poc #exploit #xxe

D4mianWayne's tweet image. Developed a PoC for exploiting CVE-2024-38653 (Ivanti Avalanche XXE). Credits to Lucas Millar (Trend Micro Security Research) for identifying the vulnerability. POC: github.com/D4mianWayne/PO…

#poc #exploit #xxe

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… #redteam #exploit #shellcode

5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode
5mukx's tweet image. Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…
PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

#redteam #exploit #shellcode

WAIT WHAT?! 😳 The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony. The exploit is in Sony’s hands now. Once patched… it could be public. Tick… tock… ⏳ #PS4Jailbreak #PS4 #Exploit #bdj

RobinsonPauli18's tweet image. WAIT WHAT?! 😳 
The PS4 BD-JB (all firmware jailbreak) was sold directly to Sony.
The exploit is in Sony’s hands now. Once patched… it could be public.
Tick… tock… ⏳

#PS4Jailbreak #PS4 #Exploit #bdj

昨晩もまたVRC! VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。 そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。 同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦

tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦
tsukinomoto_VR's tweet image. 昨晩もまたVRC!
VRC麻雀、いつメンさんとで東風戦を3回行い、結果は4位,2位,1位。
そしてオススメされた #EXPLOIT(ライアーゲーム要素が加わった5五将棋のようなゲーム)を初プレイ。
同じく初プレイのフレンドさん2人には勝てたけどチャンプニックさんには勝利できず…だったというやつでした💦

I released an Intercom exploit Identity Verification is not set up on the Intercom widget, allowing an attacker to impersonate a user and access their chat history. Reference: intercom.com/help/en/articl… Github Poc : github.com/MuhammadWaseem… #Intercom #Exploit #BugBounty

wgujjer11's tweet image. I released an Intercom exploit
Identity Verification is not set up on the Intercom widget, allowing an attacker to impersonate a user and access their chat history.
Reference:
intercom.com/help/en/articl…
Github Poc :
github.com/MuhammadWaseem…

#Intercom #Exploit #BugBounty

🚨 Dark Market Alert: India’s Illicit #Malware Bazaar 🚨 A site openly sells illegal tools: #Malware, #Exploit kits, #Crypters, cracked software & proxy access. Tools include: DcRat v1.0.7 EdgeGuard Stealer 4.0 Schwarze Sonne RAT 2.0 Zeus Botnet 2.1 EagleSpy V3 & SRC…

cyberfeeddigest's tweet image. 🚨 Dark Market Alert: India’s Illicit #Malware Bazaar 🚨

A site openly sells illegal tools:
#Malware, #Exploit kits, #Crypters, cracked software & proxy access.
Tools include:

DcRat v1.0.7

EdgeGuard Stealer 4.0

Schwarze Sonne RAT 2.0

Zeus Botnet 2.1

EagleSpy V3 & SRC…

CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣 🔴 TIPO: SQLI + RCE 🔍 DORK (Zoomeye): app="FortiWeb WAF" 💣 EXPLOIT: github.com/watchtowrlabs/… #rce #github #exploit #sqli

TodayCyberNews's tweet image. CVE-2025-25257 - FortiWeb Unauthenticated SQLi to RCE 💣

🔴 TIPO: SQLI + RCE
🔍 DORK (Zoomeye):

app="FortiWeb WAF"

💣 EXPLOIT:
github.com/watchtowrlabs/…

#rce #github #exploit #sqli

🏔️ À seulement 26 ans, Constance Schaerer entre dans l’histoire en devenant la plus jeune alpiniste alsacienne à atteindre le sommet de l’Everest ! 🇲🇨 Un exploit hors norme, une inspiration pour toute une génération. Bravo ! 👏 #Everest #Fiertéalsacienne #Exploit @UnserLand

HelfrichMaxence's tweet image. 🏔️ À seulement 26 ans, Constance Schaerer entre dans l’histoire en devenant la plus jeune alpiniste alsacienne  à atteindre le sommet de l’Everest ! 🇲🇨

Un exploit hors norme, une inspiration pour toute une génération. Bravo ! 👏 #Everest #Fiertéalsacienne #Exploit @UnserLand

✨ Exploit incroyable ! ✨ Le FC93 élimine le @RedStarFC (Ligue 2) en @coupedefrance ! Score final : 2-2, victoire aux tirs au but 🎯⚽. Une performance héroïque qui marque l’histoire du club 👏🔥 #FC93 #CoupeDeFrance #Exploit @District93foot @LPIFF75

FC93officiel's tweet image. ✨ Exploit incroyable ! ✨ 

Le FC93 élimine le @RedStarFC (Ligue 2) en @coupedefrance ! 

Score final : 2-2, victoire aux tirs au but 🎯⚽. Une performance héroïque qui marque l’histoire du club 👏🔥 

#FC93 #CoupeDeFrance #Exploit @District93foot @LPIFF75

Cryptomarket Check-In. Major Events & Headlines Catch up on the latest #crypto market action — from initial listing to #exploit. This snapshot highlights key events, including @pumpdotfun acquisition, @SuccinctLabs initial listing, and @CrediX_fi $4.5M exploit.

CryptoDiffer's tweet image. Cryptomarket Check-In. Major Events & Headlines

Catch up on the latest #crypto market action — from initial listing to #exploit. This snapshot highlights key events, including @pumpdotfun acquisition, @SuccinctLabs initial listing, and @CrediX_fi $4.5M exploit.

Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite. ☣️d3bbb54a9e93f355f7830e298a99161d ☣️b296d3b3115762096286f225696a9bb1 ☣️23094d64721a279c0ce637584b87d6f1 The race has already begun #DetectionEngineering is evolving fast. #SOC #CERT

ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT
ShanHolo's tweet image. Discovered a proof-of-concept #exploit for CVE-2025-61882 affecting #Oracle E-Business Suite.

☣️d3bbb54a9e93f355f7830e298a99161d 
☣️b296d3b3115762096286f225696a9bb1
☣️23094d64721a279c0ce637584b87d6f1

The race has already begun #DetectionEngineering is evolving fast.
 #SOC #CERT

Another Monday, another #Vulnerability (9.8) this time is @Oracle E-Business Suite (CVE-2025-61882) "This vulnerability is remotely exploitable without authentication, If successfully exploited, this vulnerability may result in remote code execution. oracle.com/security-alert…



Exploit Development Series: Panic! At The Kernel - Token Stealing Payloads Revisited on Windows 10 x64 and Bypassing SMEP connormcgarr.github.io/x64-Kernel-She… #exploit #development #kernel

5mukx's tweet image. Exploit Development Series: Panic! At The Kernel - Token Stealing Payloads Revisited on Windows 10 x64 and Bypassing SMEP

connormcgarr.github.io/x64-Kernel-She…

#exploit #development #kernel

Loading...

Something went wrong.


Something went wrong.


United States Trends