Hakan Emir Genç (@0xhech) 's Twitter Profile
Hakan Emir Genç

@0xhech

Security Researcher | Penetration Tester

ID: 1152223530672697344

linkhttps://0xhech.medium.com calendar_today19-07-2019 14:27:51

203 Tweet

217 Followers

240 Following

Ozgur Alp (@ozgur_bbh) 's Twitter Profile Photo

It looks like GitHub removed Türkiye from SMS auth support list without any warning. But while trying to log in, it still asks for 2FA code as SMS which they do not send anymore. I mean, how can one login to their account if you stop sending SMS? :) docs.github.com/en/authenticat…

Ignis (@ahakcil) 's Twitter Profile Photo

I just released an easy to use and easy to install tool for CVE-2023-38831, WinRAR RCE for versions before 6.23 pip install rarce $ rarce "interesting file.png" "exp.cmd" "output.rar" github.com/ignis-sec/CVE-… #infosec #CyberSecurity #bugbountytips

morph3 (@melihkaanyldz) 's Twitter Profile Photo

I'm starting a new series of blogposts where I will study old CVEs. First one is CVE-2021-26084. Confluence OGNL injection preauth RCE. It was easy to catch but was tricky to understand what's going on. Enjoy ! morph3.blog/posts/Studying…

Will Gates (@wllgates) 's Twitter Profile Photo

🔥Bypassing WAF by adding multiple slashes to gain SSI/ Path traversal. This is my 2nd successful shot in the dark attempt. credit: N$ Payload: GET /assets/css///////../../../../../../../../etc/passwd #BugBounty #bugbountytips

🔥Bypassing WAF by adding multiple slashes to gain SSI/ Path traversal. This is my 2nd successful shot in the dark attempt. 

credit: <a href="/nav1n0x/">N$</a> 

Payload: GET /assets/css///////../../../../../../../../etc/passwd  

#BugBounty #bugbountytips
mert (@merterpreter) 's Twitter Profile Photo

SharpIncrease is A Tool that aims to evade av with binary padding. I used this tool for years in my Red Team operations. SharpIncrease can be used as a standalone executable or with execute-assembly, inline-executeassembly. github.com/mertdas/SharpI…

Godfather Orwa 🇯🇴 (@godfatherorwa) 's Twitter Profile Photo

Hello everyone ♥ a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... Title: getting unauthorized access on 3rd party's/workspaces & and building your checklist for quickly locating bugs there via massive recon we know that its helpful to look

Hello everyone ♥
a little bit write-up of #bugbountytip #bugbountytips I am going to write here ..... 

Title:
getting unauthorized access on 3rd party's/workspaces &amp; and building your checklist for quickly locating bugs there via massive recon

we know that its helpful to look
Melih Demirer (@avmelihdemirer) 's Twitter Profile Photo

Kaizen Yasaları’nı hayatıma uygulamaya başladım ve fark ettim ki: Sürekli ertelediğim işler, bitmeyen hedefler ve karmaşa… Hepsi küçük adımlarla düzene girebiliyormuş. Şimdi size Kaizen’in nasıl çalıştığını ve bende nasıl işe yaradığını anlatıyorum. 👇

morpheus (@luminaryxd) 's Twitter Profile Photo

bizim alanlar gelmiş hemen damlıyorum, Şimdi olayı teknik olabilite ve benim fikirlerim olarak 2 kısımda değerlendireceğim son kullanıcı bilgisayarlar hacklenebilir mi ? Kişisel bilgisayarlara(PC) - evde olan bilgisayarlara 0click ile sızılması senaryosu pek olası değil hatta

morpheus (@luminaryxd) 's Twitter Profile Photo

Çok basit, çok sade, düz bir gerçek hayat SSRF örneği. Windows desktop docker escape - CVE-2025-9074 blog.qwertysecurity.com/Articles/blog3…

Rıza (@rizasabuncu) 's Twitter Profile Photo

İnternet ağı bana hep büyüleyici gelmiştir; yıllardır sektörde olmayan arkadaşlarıma da, eşime de defalarca heyecanla anlatırım. Dün bu tutkuyu bir adım öteye taşıyıp packet.school’u geliştirdim 🥳 Hem sıfırdan başlayanlar hem de meraklı öğrenciler için; teori +