Nenad Zaric (@zaricnenad_) 's Twitter Profile
Nenad Zaric

@zaricnenad_

Co-Founder @ trickest.com

ID: 701547252

calendar_today17-07-2012 18:35:53

587 Tweet

1,1K Followers

752 Following

Trickest (@trick3st) 's Twitter Profile Photo

Our top Vulnerability Scanning tools: - ZAP: Web app vulnerabilities - Nuclei: Precise scanning, no false positives - Sqlmap: Automate SQL injection flaw detection - Commix: Command injection vulnerabilities - Nikto: Web server audits Read the guide👇 trickest.com/solutions/auto…

Trickest (@trick3st) 's Twitter Profile Photo

Trickest Modules are built for real security work, fully customizable, and scalable without limits—enabling security teams to expand operations across their infrastructure without asset-based pricing. trickest.com/platform/modul…

Trickest (@trick3st) 's Twitter Profile Photo

Stuck in the classic “build vs. buy” dilemma for your cybersecurity automation projects? Our latest blog reveals the hidden pitfalls of purely DIY solutions and why a hybrid ASM approach can give you the best of both worlds. trickest.com/blog/the-hidde…

Stuck in the classic “build vs. buy” dilemma for your cybersecurity automation projects? 

Our latest blog reveals the hidden pitfalls of purely DIY solutions and why a hybrid ASM approach can give you the best of both worlds. 

trickest.com/blog/the-hidde…
Trickest (@trick3st) 's Twitter Profile Photo

"The offensive security world is broken. We spend countless hours installing tools, managing infrastructure, and wrestling with dependencies instead of securing our systems." At Trickest, we believe security professionals deserve better. The platform where hundreds security

"The offensive security world is broken. We spend countless hours installing tools, managing infrastructure, and wrestling with dependencies instead of securing our systems." 

At Trickest, we believe security professionals deserve better. The platform where hundreds security
Trickest (@trick3st) 's Twitter Profile Photo

Security infrastructure changes aren't just technical updates—they're your defense timeline. Track them. Learn from them. Without change history, you're navigating blind. Strong security requires knowing not just what changed, but why.

Security infrastructure changes aren't just technical updates—they're your defense timeline. Track them. Learn from them. Without change history, you're navigating blind. Strong security requires knowing not just what changed, but why.
Trickest (@trick3st) 's Twitter Profile Photo

Uncover deeply nested subdomains within your infrastructure using our Recursive DNS Subdomain Discovery module. By emulating adversary tactics, it identifies overlooked assets and legacy systems, providing comprehensive visibility into your attack surface. Learn more:

Uncover deeply nested subdomains within your infrastructure using our Recursive DNS Subdomain Discovery module. By emulating adversary tactics, it identifies overlooked assets and legacy systems, providing comprehensive visibility into your attack surface.

Learn more:
Trickest (@trick3st) 's Twitter Profile Photo

Managing an evolving attack surface requires visibility, automation, and customizability. Our latest video demonstrates how Trickest ASM Solution enables organizations to discover, monitor, and adapt their security approach—at scale. Watch now: trickest.com/solutions/atta…

Managing an evolving attack surface requires visibility, automation, and customizability. Our latest video demonstrates how Trickest ASM Solution enables organizations to discover, monitor, and adapt their security approach—at scale.

Watch now: trickest.com/solutions/atta…
Trickest (@trick3st) 's Twitter Profile Photo

Trickest Editor now delivers a complete IDE experience for offensive security teams. With unified command line, advanced file tree structure, and intelligent filtering capabilities, security professionals can build automation faster and debug complex workflows more effectively.

Trickest Editor now delivers a complete IDE experience for offensive security teams. 

With unified command line, advanced file tree structure, and intelligent filtering capabilities, security professionals can build automation faster and debug complex workflows more effectively.
Trickest (@trick3st) 's Twitter Profile Photo

Modern attack surface management means having your security data at your fingertips. Query, filter, and analyze your external footprint in real-time to stay ahead of threats and maintain visibility across your entire digital infrastructure. Learn more: trickest.com/blog/trickest-…

Trickest (@trick3st) 's Twitter Profile Photo

Why spend hours building in-house security workflows when you can deploy proven ones instantly? Trickest's workflow library lets you copy and run comprehensive attack chains on your targets with just a few clicks. From web server discovery to credential hunting - battle-tested

Why spend hours building in-house security workflows when you can deploy proven ones instantly?

Trickest's workflow library lets you copy and run comprehensive attack chains on your targets with just a few clicks. From web server discovery to credential hunting - battle-tested
Trickest (@trick3st) 's Twitter Profile Photo

ToolShell coverage has been all over the place. We held off publishing until we could reconcile the discrepancies between the original exploit reports, Microsoft’s advisories, public PoCs, and vendor writeups. Appendix breaks down the CVE mixups and variant exploits

ToolShell coverage has been all over the place.

We held off publishing until we could reconcile the discrepancies between the original exploit reports, Microsoft’s advisories, public PoCs, and vendor writeups.

Appendix breaks down the CVE mixups and variant exploits
Nenad Zaric (@zaricnenad_) 's Twitter Profile Photo

One weak password. Full control. Earlier this year, attackers opened a dam valve for hours. The press called it “sophisticated.” The reality: an exposed admin panel and weak credentials. Once you understand the process, execution is trivial. theguardian.com/world/2025/aug…

One weak password. Full control.

Earlier this year, attackers opened a dam valve for hours. The press called it “sophisticated.” 

The reality: an exposed admin panel and weak credentials.

Once you understand the process, execution is trivial.

theguardian.com/world/2025/aug…