Ankush Goel (@0xankush) 's Twitter Profile
Ankush Goel

@0xankush

ID: 616776804

calendar_today24-06-2012 02:54:14

2,2K Tweet

404 Followers

3,3K Following

RyotaK (@ryotkak) 's Twitter Profile Photo

I published an article about remote code execution in cdnjs that could allow tampering of 12.7% of all websites on the internet. blog.ryotak.me/post/cdnjs-rem…

RyotaK (@ryotkak) 's Twitter Profile Photo

I published an article about a potential remote code execution in PyPI (Python's Package Registry) that could allow an attacker to compromise the ecosystem of Python. blog.ryotak.me/post/pypi-pote…

Het Mehta (@hetmehtaa) 's Twitter Profile Photo

GCP Penetration Testing Notes📝: Part 1: 0xd4y.com/2022/10/01/GCP… Part 2: 0xd4y.com/2022/10/24/GCP… #TheSecureEdge #Infosec #cloud #hacking #gcp #Google

Trickest (@trick3st) 's Twitter Profile Photo

Got a new exploit and need a big enough dataset of web servers to test it legally (while netting some bounties)? Inventory’s got you covered!

Got a new exploit and need a big enough dataset of web servers to test it legally (while netting some bounties)?

Inventory’s got you covered!
@bytes032.xyz (@bytes032) 's Twitter Profile Photo

Want to do smart contract audits? You should learn Solidity first. There's no shortcut to that. However, today I'm sharing with you MY step-by-step guide on how I PERSONALLY studied it, hopefully to help you get started and save you some time 👇

@bytes032.xyz (@bytes032) 's Twitter Profile Photo

I want to be a TOP smart contract auditor. Solidity is a MUST HAVE, but building a strong foundation in EVM is crucial. Starting this week, I'll be diving deep into the EVM. Today, I'm sharing my ORDERED STEP-BY-STEP study plan. Join me, and let's tackle it together! 👇

Nazmul Hossain Nirab (@x1337loser) 's Twitter Profile Photo

Earned More than $10000 in bounties, successfully hacked 11 company. want to learn more about 'Dependency Confusion' attack? Then follow this 👇 github.com/x1337loser/Dep… #infosec #BugBounty #bugbountytips #bugbountytip

Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

DetectDee - Hunt down social media accounts by username, email or phone across social networks. github.com/piaolin/Detect… #cybersecurity #OSINT

Rowan Cheung (@rowancheung) 's Twitter Profile Photo

1. Prompt Storm A Google Chrome extension that hand feeds you the best prompts to use with ChatGPT and Google's Bard. promptstorm.app

Rowan Cheung (@rowancheung) 's Twitter Profile Photo

Start leveraging AI now, or get left behind. I turned my website, YouTube video, PDF, Notion page, and code into a chatbot like ChatGPT to talk with and get answers quicker. Here's how to save hours a day:

Kubernetes with Naveen 🇮🇳 (@naveens16) 's Twitter Profile Photo

How Secrets Leak in CI/CD Pipelines Secrets leak in CI/CD pipelines routinely. CI/CD workflows typically require developers to provide valid credentials for the 3rd party resources their pipeline interacts with. 👀trufflesecurity.com/blog/secrets-l… #DevOps #Kubernetes #CICD

mgeeky | Mariusz Banach (@mariuszbit) 's Twitter Profile Photo

🔥 Having some hard time with Initial Access during your gigs? Join the February☢️Modern Initial Access and Evasion Tactics☢️ training round and dive deep into lesser known arcanes of common file vectors! Class trusted by many experienced fellow RTerz! binary-offensive.com/initial-access…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

😈 How to protect Evilginx using Cloudflare and HTML Obfuscation * Cloudflare's 'Under Attack Mode' * Geo-block connections outside of you/target * Use another server as a redirector * Use meta refresh and HTML obfuscation By Jack Button #redteam jackphilipbutton.com/post/how-to-pr…

HITBSecConf (@hitbsecconf) 's Twitter Profile Photo

#HITB2024BKK Secret Scanning in Open Source at Scale (in-depth) - Danish Tariq & Hassan Khan Yusufzai - conference.hitb.org/hitbsecconf202…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

Slides for 3 cloud security talks from Hacker Summer Camp 1️⃣ Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities for Initial Access - By Nick Frichette docs.google.com/presentation/d… 2️⃣ Exploiting Common Vulnerabilities in AWS environments - By Seth Art

Ankush Goel (@0xankush) 's Twitter Profile Photo

Khalani network compromised. Check out github.com/mickeymou3e/kh… for their private data. Refused bounty after fixing the issue. #Web3 #khalaninetwork #CryptoNews #BugBounty #katana #SmartContracts