Tech Girl (@cybersecurityio) 's Twitter Profile
Tech Girl

@cybersecurityio

Unveiling untold tales from around the globe ๐ŸŒŽ Embrace wanderlust and curiosity with us as we navigate life's remarkable journey. #XplorersRealm

ID: 1689144523299880960

calendar_today09-08-2023 05:20:20

146 Tweet

35 Followers

89 Following

Bahruz Jabiyev (@bahruzjabiyev) 's Twitter Profile Photo

Let me share our latest "Gudifu" paper and tool about a new search technique for parsing discrepancies between HTTP servers. The Gudifu tool has discovered several previously unknown attack vectors on popular server pairs such as Request Smuggling, Access Control Bypass and

Let me share our latest "Gudifu" paper and tool about a new search technique for parsing discrepancies between HTTP servers. The Gudifu tool has discovered several previously unknown attack vectors on popular server pairs such as Request Smuggling, Access Control Bypass and
xss0r (@xss0r) 's Twitter Profile Photo

youtube.com/watch?v=vPwV4xโ€ฆ I just came across an amazing video showcasing the XSS to Account Takeover process using the xss0r Tool! ๐Ÿ˜ฑ This video highlights just how powerful and effective the tool is when it comes to finding and exploiting XSS vulnerabilities. If you havenโ€™t seen

xss0r (@xss0r) 's Twitter Profile Photo

#xss0rRecon script ! From a total of 209 links crawled from the testphp.vulnweb.com site, xss0rRecon identified 4 URLs potentially vulnerable to reflected XSS attacks. This demonstrates the power and efficiency of xss0rRecon. Currently tested on Debian, with configurations

#xss0rRecon script !
From a total of 209 links crawled from the testphp.vulnweb.com site, xss0rRecon identified 4 URLs potentially vulnerable to reflected XSS attacks.  This demonstrates the power and efficiency of xss0rRecon.   Currently tested on Debian, with configurations
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

๐Ÿšจ I convinced my team to do one last giveaway! Options: hhub.io/eu2wxGj ๐Ÿ† Full Access: $199 ๐Ÿ’ป Lifetime Course: $39 (includes updates) ๐ŸŽฏ 1-Month trial (no updates): $19 TWO WINNERS (1 each): - Full cert bundle - Lifetime access Enter: โ†ช๏ธ RT + Reply with ๐ŸŽฏ

๐Ÿšจ I convinced my team to do one last giveaway!

Options: hhub.io/eu2wxGj
๐Ÿ† Full Access: $199 
๐Ÿ’ป Lifetime Course: $39 (includes updates)
 ๐ŸŽฏ 1-Month trial (no updates): $19

TWO WINNERS (1 each):
- Full cert bundle
- Lifetime access

Enter: โ†ช๏ธ RT + Reply with ๐ŸŽฏ
Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

๐ŸŽ End of Year Giveaway ๐ŸŽ Hack The Box 6-month VIP+ x1 - Follow, Like, and Retweet to join! - Winner will be picked randomly on December. #hackthebox #giveaway #projectsekaictf

๐ŸŽ End of Year Giveaway ๐ŸŽ 

Hack The Box 6-month VIP+ x1
- Follow, Like, and Retweet to join!
- Winner will be picked randomly on December.

#hackthebox #giveaway #projectsekaictf
Learn Prompting (@learnprompting) 's Twitter Profile Photo

๐Ÿ”ด GIVEAWAY ALERT ๐Ÿ”ด Our AI Red Teaming cohort is over 50% full and starts in just 9 days! For Black Friday, we're giving away TWO seats to our course, which is led by the world's top AI Security Experts! RT this post & Comment below to enter! Winners announced on Dec. 1st!

๐Ÿ”ด GIVEAWAY ALERT ๐Ÿ”ด

Our AI Red Teaming cohort is over 50% full and starts in just 9 days!

For Black Friday, we're giving away TWO seats to our course, which is led by the world's top AI Security Experts!

RT this post & Comment below to enter!

Winners announced on Dec. 1st!
The SecOps Group (@thesecopsgroup) 's Twitter Profile Photo

๐Ÿš€Black Friday Giveaway!๐Ÿค— *** ๐—™๐—ผ๐—น๐—น๐—ผ๐˜„ ๐—ผ๐˜‚๐—ฟ ๐—ฝ๐—ฎ๐—ด๐—ฒ, ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜, ๐—Ÿ๐—ถ๐—ธ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ต๐—ถ๐—ฐ๐—ต ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ผ๐˜‚๐—น๐—ฑ ๐—น๐—ถ๐—ธ๐—ฒ ๐˜๐—ผ ๐˜„๐—ถ๐—ป ๐—ฎ๐—ป๐—ฑ ๐Ÿฑ ๐—น๐˜‚๐—ฐ๐—ธ๐˜† ๐˜„๐—ถ๐—ป๐—ป๐—ฒ๐—ฟ๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ด๐—ฒ๐˜ ๐—ฎ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฐ๐—ต๐—ผ๐—ถ๐—ฐ๐—ฒ! *** Get

๐Ÿš€Black Friday Giveaway!๐Ÿค—
*** ๐—™๐—ผ๐—น๐—น๐—ผ๐˜„ ๐—ผ๐˜‚๐—ฟ ๐—ฝ๐—ฎ๐—ด๐—ฒ, ๐—ฅ๐—ฒ๐—ฝ๐—ผ๐˜€๐˜, ๐—Ÿ๐—ถ๐—ธ๐—ฒ ๐—ฎ๐—ป๐—ฑ ๐—–๐—ผ๐—บ๐—บ๐—ฒ๐—ป๐˜ ๐˜„๐—ต๐—ถ๐—ฐ๐—ต ๐—ฒ๐˜…๐—ฎ๐—บ ๐˜†๐—ผ๐˜‚ ๐˜„๐—ผ๐˜‚๐—น๐—ฑ ๐—น๐—ถ๐—ธ๐—ฒ ๐˜๐—ผ ๐˜„๐—ถ๐—ป ๐—ฎ๐—ป๐—ฑ ๐Ÿฑ ๐—น๐˜‚๐—ฐ๐—ธ๐˜† ๐˜„๐—ถ๐—ป๐—ป๐—ฒ๐—ฟ๐˜€ ๐˜„๐—ถ๐—น๐—น ๐—ด๐—ฒ๐˜ ๐—ฎ ๐—ณ๐—ฟ๐—ฒ๐—ฒ ๐—ฒ๐˜…๐—ฎ๐—บ ๐—ผ๐—ณ ๐˜๐—ต๐—ฒ๐—ถ๐—ฟ ๐—ฐ๐—ต๐—ผ๐—ถ๐—ฐ๐—ฒ! ***

Get
Jason Haddix (@jhaddix) 's Twitter Profile Photo

๐Ÿ›‘ GIVEAWAY ALERT ๐Ÿ›‘ Today is day THREE of FIVE days of Arcanum Information Security and friends Black Friday and Cyber Monday giveaways! Today we are giving away FIVE seats to our NEW training: "Hacking Your Career" HYC releases in January and is PACKED with actionable advice to

๐Ÿ›‘ GIVEAWAY ALERT ๐Ÿ›‘ 

Today is day THREE of FIVE days of <a href="/arcanuminfosec/">Arcanum Information Security</a>
and friends Black Friday and Cyber Monday giveaways! 

Today we are giving away FIVE seats to our NEW training:  

"Hacking Your Career"  

HYC releases in January and is PACKED with actionable advice to
Jason Haddix (@jhaddix) 's Twitter Profile Photo

๐Ÿ›‘ GIVEAWAY ALERT ๐Ÿ›‘ โฌ‡๏ธ Today is day SIX of EIGHT days of Arcanum Information Security and friends Black Friday and Cyber Monday giveaways! Today game recognizes game. If youโ€™ve taken my classes, you know I always recommend @LearnPrompting. Today, Iโ€™m giving away one free seat to their

xss0r (@xss0r) 's Twitter Profile Photo

๐ŸŽ‰โœจ Big News for GOLDEN PLAN License Winners! โœจ Congratulations again to our 10 lucky winners! We have an important update: out of the 10 winners, only 9 have completed all the required steps to claim their license. ๐Ÿ•’ To the selected winners: Please ensure you message us

Godfather Orwa ๐Ÿ‡ฏ๐Ÿ‡ด (@godfatherorwa) 's Twitter Profile Photo

One more example for bad behavior / Scam in paid subscription for bugbounty santimillionaire.com I was there for the last 5 months trying to find something useful but unfortunately nothing , just a ready payloads and some tips filtered for each bug and this month I found

One more example for bad behavior / Scam
 in paid subscription for bugbounty

 santimillionaire.com

I was there for the last 5 months trying to find something useful but unfortunately nothing , just a ready payloads and some tips filtered for each bug 

and this month I found
Nagli (@galnagli) 's Twitter Profile Photo

Critical vulnerabilities doesn't have to be complex or have a CVE - DeepSeek publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data. No one is safe from security mistakes, follow along to learn more ๐Ÿงต

Critical vulnerabilities doesn't have to be complex or have a CVE - <a href="/deepseek_ai/">DeepSeek</a> publicly exposed their internal ClickHouse database to the world, without any authentication at all, and leaked sensitive data.

No one is safe from security mistakes, follow along to learn more ๐Ÿงต
James Kettle (@albinowax) 's Twitter Profile Photo

Per popular demand, Turbo Intruder 1.51 now inserts results at the top of the table so you can watch them arrive without scrolling! Let me know how you find it. If you prefer the old behaviour, you can change it back using: table.setSortOrder(0, False)

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

You might have noticed that the recent SAML writeups omit some crucial details. In "SAML roulette: the hacker always wins", we share everything you need to know for a complete unauthenticated exploit on ruby-saml, using GitLab as a case-study. portswigger.net/research/saml-โ€ฆ

zhero; (@zhero___) 's Twitter Profile Photo

the research paper is out: Next.js and the corrupt middleware: the authorizing artifact result of a collaboration with inzo that led to CVE-2025-29927 (9.1-critical) zhero-web-sec.github.io/research-and-tโ€ฆ enjoy the read!

the research paper is out:

Next.js and the corrupt middleware: the authorizing artifact

result of a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-29927 (9.1-critical)

zhero-web-sec.github.io/research-and-tโ€ฆ

enjoy the read!
Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

Day 2 is packed with some ๐Ÿ”ฅ talks! Check out the entire schedule on NahamCon.com! Remember this is 100% free, no tickets or anything needed. Just show up and watch the talks!

Day 2 is packed with some ๐Ÿ”ฅ talks!  Check out the entire schedule on NahamCon.com! Remember this is 100% free, no tickets or anything needed. Just show up and watch the talks!
XBOW (@xbow) 's Twitter Profile Photo

โšก๏ธXBOW found LFI where most tools would have given up. Photo download endpoint blocked all path traversal attempts. But JavaScript analysis revealed /photo/proxy?url= - vulnerable to file:// scheme access. Successfully read a password file via proxy endpoint. Technical

PortSwigger Research (@portswiggerres) 's Twitter Profile Photo

The voting has concluded, and we're thrilled to announce the top ten web hacking techniques of 2025! Massive thanks to everyone in the community for sharing their hard-earned discoveries, plus the panel and everyone who nominated or voted! portswigger.net/research/top-1โ€ฆ