Hassan Ali (@casp3r0x0) 's Twitter Profile
Hassan Ali

@casp3r0x0

OSEP OSWE OSED (OSCE3) | OSCP | CCNP ENCOR & SCOR | CCNA | Senior Penetration Tester | Red Teamer

ID: 1320042180585586689

linkhttps://www.youtube.com/c/ZeroOnez calendar_today24-10-2020 16:39:23

47 Tweet

101 Followers

684 Following

Omar (evm/acc)πŸ“NYC (@acceleratooooor) 's Twitter Profile Photo

πŸš¨π—§π—›π—˜ π—¨π—Ÿπ—§π—œπ— π—”π—§π—˜ π—šπ—œπ—§π—›π—¨π—• 𝗗𝗒π—₯π—žπ—¦ π—Ÿπ—œπ—¦π—§ π—©πŸ― 🚨 A total of now 𝟱𝟬𝟬+ dorks for sensitive information exposure to find easy wins. Text file and my tool to automate these dorks tinyurl.com/gitdorks #BugBounty #bugbountytip #bugbountytips #github #infosec

πŸš¨π—§π—›π—˜ π—¨π—Ÿπ—§π—œπ— π—”π—§π—˜ π—šπ—œπ—§π—›π—¨π—• 𝗗𝗒π—₯π—žπ—¦ π—Ÿπ—œπ—¦π—§ π—©πŸ― 🚨

A total of now 𝟱𝟬𝟬+ dorks for sensitive information exposure to find easy wins.

Text file and my tool to automate these dorks
tinyurl.com/gitdorks

#BugBounty #bugbountytip #bugbountytips #github #infosec
Sam Anttila πŸ›πŸ”πŸ‘€ (@samuelanttila) 's Twitter Profile Photo

XSS cheat sheet only with stuff that works in 2021! Feature additions: * Tons of XSS filter bypasses! * mXSS Sanitizer bypasses * URL Schema filter tips * MIME type exploitation * Too much stuff to fit here! netsec.expert/posts/xss-in-2… #cybersecurity #hacking #security #bugbountytip

XSS cheat sheet only with stuff that works in 2021!
Feature additions:
* Tons of  XSS filter bypasses!
* mXSS Sanitizer bypasses
* URL Schema filter tips
* MIME type exploitation
* Too much stuff to fit here!
netsec.expert/posts/xss-in-2…
#cybersecurity #hacking #security #bugbountytip
TryHackMe (@realtryhackme) 's Twitter Profile Photo

Half a million people are learning cyber security on TryHackMe! Retweet this & let us know why you signed up to TryHackMe? 5 random answers get $100 worth of Swag/Vouchers/PrizesπŸ€ Thank YOU for supporting us! 250k of you signed up in the last 6 months: blog.tryhackme.com/there-are-half…

PentesterLab (@pentesterlab) 's Twitter Profile Photo

Ψ£Ψ΅Ψ―Ψ±Ω†Ψ§ Ω„Ω„Ψͺو ΨͺΨ±Ψ¬Ω…Ψ§Ψͺ Ψ¨Ψ§Ω„Ω„ΨΊΨ© Ψ§Ω„ΨΉΨ±Ψ¨ΩŠΨ© Ω„Ω…Ψ―Ψ© 13 Ψ³Ψ§ΨΉΨ© Ω…Ω† Ω…Ω‚Ψ§Ψ·ΨΉ Ψ§Ω„ΩΩŠΨ―ΩŠΩˆ! Ψ£ΨΉΨ― Ψ§Ω„Ψͺغريد Ω„Ω„Ψ­Ψ΅ΩˆΩ„ ΨΉΩ„Ω‰ فرءة Ω„Ψ±Ψ¨Ψ­ Ω‚Ψ³ΩŠΩ…Ψ© Ω„Ω…Ψ―Ψ© 12 Ψ΄Ω‡Ψ±Ω‹Ψ§

hAPI_hacker (@hapi_hacker) 's Twitter Profile Photo

Hacking APIs Book Giveaway sponsored by APIsec.ai! We are giving away 10 print books. One entry per: β™₯️ Like πŸ” RT πŸ‘‘Bonus entry to anyone who follows APIsec. Ends in 48 hours!

Hacking APIs Book Giveaway sponsored by APIsec.ai! We are giving away 10 print books. 

One entry per:
β™₯️ Like πŸ” RT

πŸ‘‘Bonus entry to anyone who follows <a href="/apisec_ai/">APIsec</a>.  Ends in 48 hours!
Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

Would you be interested if I do a video series on basic OS Internals? #DFIR #Cybersecurity If this poll reaches at least 1K of interaction, I will start recording. Feel free to drop suggestions, otherwise I'll prepare a draft ToC. Focus will be on the Windows Operating System.

hAPI_hacker (@hapi_hacker) 's Twitter Profile Photo

The Ben Sadeghipour Hacking APIs book giveaway! Giving out 10 signed print copies and I'll ship them anywhere 🌎🌍🌏 One entry per: β™₯️ Like πŸ” RT Ends in 48 hours! Don't want to wait? Pick up a copy over No Starch Press. nostarch.com/hacking-apis

Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

I wanted to thank Dean from Metadata Forensics for writing a review about our #CCDFA Exam which can be found below. Special thanks to Jessica Hyde for working on the exam committee with us… If you’re doing #DFIR PLEASE READ it… it won’t take more than 3 minutes… Very proud of you all! β€οΈπŸ™πŸ»

LiveOverflow πŸ”΄ (@liveoverflow) 's Twitter Profile Photo

The fact that they developed a complete zero-click to kernel chain, JUST to then force the device to open a web page to trigger the "real" chain, is the most bureaucratic exploit I can imagine πŸ™ˆ koeln.ftp.media.ccc.de/congress/2023/…

The fact that they developed a complete zero-click to kernel chain, JUST to then force the device to open a web page to trigger the "real" chain, is the most bureaucratic exploit I can imagine πŸ™ˆ

koeln.ftp.media.ccc.de/congress/2023/…
Ali Hadi | B!n@ry (@binaryz0ne) 's Twitter Profile Photo

If you're new to this account and want to learn about Software Exploitation, then I have a full course recorded for FREE found below. It goes from the very basics and moves on. All the labs and material is shared too. #Cybersecurity #Offsec #Exploitation youtube.com/playlist?list=…

If you're new to this account and want to learn about Software Exploitation, then I have a full course recorded for FREE found below. It goes from the very basics and moves on. All the labs and material is shared too. #Cybersecurity #Offsec #Exploitation

youtube.com/playlist?list=…
eShard (@eshard) 's Twitter Profile Photo

We'll share more news regarding the iOS emulator in the next month or so. 𝗦𝗽𝗼𝗢𝗹𝗲𝗿: shortlist...?

White Knight Labs (@wkl_cyber) 's Twitter Profile Photo

Think your backups are safe? Today’s WKL post may prove otherwise. Hassan Ali shows how a single Veeam weakness led straight to Domain Admin. Full post: whiteknightlabs.com/2025/12/09/fro…

Think your backups are safe? Today’s WKL post may prove otherwise.

<a href="/casp3r0x0/">Hassan Ali</a> shows how a single Veeam weakness led straight to Domain Admin.

Full post: whiteknightlabs.com/2025/12/09/fro…