vikas@hacker-team (@00xneo) 's Twitter Profile
vikas@hacker-team

@00xneo

Cyber security deep learner

ID: 1582295405337149440

linkhttps://discord.gg/w4bXtaZubZ calendar_today18-10-2022 09:00:20

1,1K Tweet

59 Followers

1,1K Following

Bipin Jitiya (@win3zz) 's Twitter Profile Photo

If you come across a target that hosts Zendesk, don't forget to fuzz their API endpoints for potential misconfigurations and information leaks. But be cautious! The list includes various deletion endpoints as well. List of Zendesk API endpoints: gist.github.com/win3zz/05e2feb…

vikas@hacker-team (@00xneo) 's Twitter Profile Photo

No one is safe in rajasthan fooling person's/people's spamming and acting as threat actor(just studens). Without any reason. Please look into the matter and take strict action else we need to take and you will be responsible Government of Rajasthan CMO Rajasthan Rajasthan Police

No one is safe in rajasthan fooling person's/people's spamming and acting as threat actor(just studens). Without any reason.

Please look into the matter and take strict action else we need to take and you will be responsible
<a href="/RajGovOfficial/">Government of Rajasthan</a>
<a href="/RajCMO/">CMO Rajasthan</a> 
<a href="/PoliceRajasthan/">Rajasthan Police</a>
Eduardo Nuri (@eduardo_nuri) 's Twitter Profile Photo

How I dropped a crit 0day XXE to full read SSRF in less than 6 hours. - Pentest customer had a 3rd party paid software that looked promising, IIS + Java + some jsp public files. - Googled some time ago and couldn't find a copy. - Last month I found .iso links in a Chinese

How I dropped a crit 0day XXE to full read SSRF in less than 6 hours.

- Pentest customer had a 3rd party paid software that looked promising, IIS + Java + some jsp public files.

- Googled some time ago and couldn't find a copy.

- Last month I found .iso links in a Chinese
Nikhil (@ox4d5a) 's Twitter Profile Photo

FREE COUPON to my 60 hour ethical hacking course on #udemy. First 1000 redemptions only. HURRY UP. Kickstart your journey into hacking. youtu.be/zyDXS6p46cM #infosec #malware #cybersecurity #hacking #redteam

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

Google Dork - File Upload 📁 (site:example[.]com | site:example[.]org) & intext:"choose file” credit: Mike Takahashi #bugbountytips #BugBounty #bugbountytip #bugbounty

Google Dork - File Upload 📁

(site:example[.]com | site:example[.]org) &amp; intext:"choose file”

credit: <a href="/TakSec/">Mike Takahashi</a> 
#bugbountytips #BugBounty #bugbountytip #bugbounty
Stephan Berger (@malmoeb) 's Twitter Profile Photo

We see a lot of threat actors in our Incident Response cases who disable or tamper with the local AV. The website privacy.sexy has a copy & paste script to turn off most of Defenders features. [1] How many of these modifications (or deactivations) will trigger an

We see a lot of threat actors in our Incident Response cases who disable or tamper with the local AV.

The website privacy.sexy has a copy &amp; paste script to turn off most of Defenders features. [1] How many of these modifications (or deactivations) will trigger an
Milan Jain 🇮🇳 (@scriptkiddie___) 's Twitter Profile Photo

jai shri Ram 🙏 got $$ bounty Thanks to Lord shri krishna for this! #Hacker #tryharder #prerna #bounty #scriptkiddie #love #inspription #bugbountyhunter

jai shri Ram 🙏
got $$ bounty  
Thanks to Lord shri krishna for this!
#Hacker #tryharder #prerna #bounty #scriptkiddie #love #inspription #bugbountyhunter
VAIDIK PANDYA (@h4x0r_fr34k) 's Twitter Profile Photo

Request Smuggling ? Here are 10 blogs to learn more about them 1. medium.com/@StealthyBugs/… 2. infosecwriteups.com/exploiting-htt… 3. ricardoiramar.medium.com/the-powerful-h… 4. gupta-bless.medium.com/exploiting-htt… 5. medium.com/cyberverse/ear… 6. medium.com/@knownsec404te… 7. osintteam.blog/slip-in-unnoti… 8.