#vulnerabilityexploits 搜尋結果

未找到 "#vulnerabilityexploits" 的結果

Do you want to find more vulnerabilities with recon? 🤑 Open this thread (step-by-step guide)! 🧵 👇

intigriti's tweet image. Do you want to find more vulnerabilities with recon? 🤑

Open this thread (step-by-step guide)! 🧵 👇

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://arora-labs[.]com/ 🔎 Analysis: urlscan.io/result/0199fb5… 🔒 #InfoSec 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://arora-labs[.]com/
🔎 Analysis: urlscan.io/result/0199fb5…

🔒 #InfoSec
🛡️ @Phish_Destroy

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://jakt[.]top/ 🔎 Analysis: urlscan.io/result/0199fb5… 🔒 #Crypto 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://jakt[.]top/
🔎 Analysis: urlscan.io/result/0199fb5…

🔒 #Crypto
🛡️ @Phish_Destroy

Today I used a technique that’s probably not widely known in the community. In what cases could code like this lead to a vulnerability? ->

slonser_'s tweet image. Today I used a technique that’s probably not widely known in the community.
In what cases could code like this lead to a vulnerability? ->

Hackers 🔥 This code contains at least 2 serious vulnerabilities. Can you spot them? 😋 What would be your exploit? 🤔

chux13786509's tweet image. Hackers 🔥
This code contains at least 2 serious vulnerabilities.
Can you spot them? 😋
What would be your exploit? 🤔

Exploiting file upload vulnerabilities (part 2) 🧵👇

intigriti's tweet image. Exploiting file upload vulnerabilities (part 2) 🧵👇

Path Traversal Vulnerability POC: https://redacted/lib///....//....//....//....//....//....//....//....//etc//passwd #bugbountytips #lfi #bugbountywriteups #bugbounty #infosec

NullSecurityX's tweet image. Path Traversal Vulnerability  

POC:
https://redacted/lib///....//....//....//....//....//....//....//....//etc//passwd

#bugbountytips #lfi #bugbountywriteups #bugbounty #infosec

Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

developer_ali15's tweet image. Just found a vulnerability using @coffinxp7 tool. Absolute legend 🙌

Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 Open this thread! 🧵 👇

intigriti's tweet image. Want to find more vulnerabilities using BurpSuite match & replace rules? 🤑 

Open this thread! 🧵 👇

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://betcas[.]us/ 🔎 Analysis: urlscan.io/result/0199fb4… 🔒 #Crypto 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://betcas[.]us/
🔎 Analysis: urlscan.io/result/0199fb4…

🔒 #Crypto
🛡️ @Phish_Destroy

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://cyberinvestigations[.]online/ 🔎 Analysis: urlscan.io/result/0199fb5… 🔒 #scam 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://cyberinvestigations[.]online/
🔎 Analysis: urlscan.io/result/0199fb5…

🔒 #scam
🛡️ @Phish_Destroy

2.Bypass Tricks and exploitation methods #sqli #bugbounty

jsmonsh's tweet image. 2.Bypass Tricks and exploitation methods

#sqli #bugbounty

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://voltbet[.]top/ 🔎 Analysis: urlscan.io/result/0199fb5… 🔒 #InfoSec 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://voltbet[.]top/
🔎 Analysis: urlscan.io/result/0199fb5…

🔒 #InfoSec
🛡️ @Phish_Destroy

A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware You just got vibepwned

zack_overflow's tweet image. A popular NPM package got compromised, attackers updated it to run a post-install script that steals secrets

But the script is a *prompt* run by the user's installation of Claude Code. This avoids it being detected by tools that analyze code for malware

You just got vibepwned

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://luckyranch[.]us/ 🔎 Analysis: urlscan.io/result/0199fb5… 🔒 #OnlineSafety 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://luckyranch[.]us/
🔎 Analysis: urlscan.io/result/0199fb5…

🔒 #OnlineSafety
🛡️ @Phish_Destroy

Exploiting file upload vulnerabilities 🧵👇

intigriti's tweet image. Exploiting file upload vulnerabilities 🧵👇

🚨 #phishing report issued 🚨 🌐 Suspected URL: https://gotbet[.]cc/ 🔎 Analysis: urlscan.io/result/0199fb4… 🔒 #phishdestroy 🛡️ @Phish_Destroy

CarlyGriggs13's tweet image. 🚨 #phishing report issued 🚨
🌐 Suspected URL: https://gotbet[.]cc/
🔎 Analysis: urlscan.io/result/0199fb4…

🔒 #phishdestroy
🛡️ @Phish_Destroy

⚡ New Android exploit “Pixnapping” steals 2FA codes via GPU side-channels. — No special permissions — Works across apps (Maps, Authenticator, etc.) — Full 2FA capture in ~30s

gierek_grzegorz's tweet image. ⚡ New Android exploit “Pixnapping” steals 2FA codes via GPU side-channels.

— No special permissions
— Works across apps (Maps, Authenticator, etc.)
— Full 2FA capture in ~30s

Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001) syst3mfailure.io/rbtree-family-… Credits @cor_ctf #infosec #Linux

0xor0ne's tweet image. Exploiting a Use-After-Free vulnerability in the Linux network packet schedule (CVE-2025-38001)

syst3mfailure.io/rbtree-family-…

Credits @cor_ctf

#infosec #Linux

Loading...

Something went wrong.


Something went wrong.


United States Trends