Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile
Md Ismail Šojal 🕷️

@0x0sojalsec

Cyber_Security_Re-searcher || 0SINT || Malware Analysis II Pwn || Ai Re-searcher || @GHOST_3xP10iT || 0ld Accounts Suspended @0xSojalSec ||

ID: 1445347022555340805

linkhttps://www.linkedin.com/in/0xsojalsec/ calendar_today05-10-2021 11:16:38

34,34K Tweet

28,28K Followers

4,4K Following

db (@whokilleddb) 's Twitter Profile Photo

Do you want to trigger shellcode only when: - Certain DNS resolution happens? - Certain servers are reached out to? - When you get a 112 byte long response? ...etc Meet InternetSetStatusCallback() for fine tuning execution (or if you are just bored): gist.github.com/whokilleddb/59…

Do you want to trigger shellcode only when:
- Certain DNS resolution happens?
- Certain servers are reached out to?
- When you get a 112 byte long response?
...etc

Meet InternetSetStatusCallback() for fine tuning execution (or if you are just bored): 

gist.github.com/whokilleddb/59…
0b1d1 (@_0b1d1) 's Twitter Profile Photo

🤖 HexStrike AI MCP Agents Automating Cybersecurity with AI ⚡ HexStrike AI MCP Agents is a powerful Model Context Protocol (MCP) server that links AI agents (Claude, GPT, Copilot, and more) with 150+ cybersecurity tools.

🤖 HexStrike AI MCP Agents Automating Cybersecurity with AI ⚡

HexStrike AI MCP Agents is a powerful Model Context Protocol (MCP) server that links AI agents (Claude, GPT, Copilot, and more) with 150+ cybersecurity tools.
Otterly (@ott3rly) 's Twitter Profile Photo

5 stages of hacking: - This is impossible. - Why am I even doing this? - Wait... what if I try this? - holy sh*t it worked - I am a genius.

vx-underground (@vxunderground) 's Twitter Profile Photo

Hello, Are you a nerd who likes malware reverse engineering or detection? Are you a nerd who wants to study Yara rule stuff (including for iPhones)? Cool! Thanks to t-tani we've added 28,805 Yara rules. They're online now. ./Papers/Malware Defense/Yara Rules

Hello,

Are you a nerd who likes malware reverse engineering or detection? Are you a nerd who wants to study Yara rule stuff (including for iPhones)? Cool! Thanks to <a href="/_t_tani/">t-tani</a> we've added 28,805 Yara rules.

They're online now.

./Papers/Malware Defense/Yara Rules
𓂆 عبدالله عمر الخطاب 🇵🇸 (@abdallahomer13) 's Twitter Profile Photo

Today I got my 4th valid security vulnerability at Meta Bug Bounty 🥳🥳🥳 WhatsApp is my fav target out there. Try to break the apps logic you may find something #BugBounty #bugbountytip #Bugcrowd

Today I got my 4th valid security vulnerability at <a href="/metabugbounty/">Meta Bug Bounty</a> 🥳🥳🥳
WhatsApp is my fav target out there. Try to break the apps logic you may find something 
#BugBounty
#bugbountytip
#Bugcrowd
Abhishek Meena - {🔥} (@aacle_) 's Twitter Profile Photo

Thread: 1/4 Bug Bounty Tip 🧵: Your next critical finding might be hiding in a publicly exposed .git directory. It's a common misconfiguration that leaks the entire code history, including secrets, old endpoints, and unpatched vulns. #bugbountytips #infosec

Thread: 1/4

Bug Bounty Tip 🧵: Your next critical finding might be hiding in a publicly exposed .git directory.

It's a common misconfiguration that leaks the entire code history, including secrets, old endpoints, and unpatched vulns.

#bugbountytips #infosec
bugcrowd (@bugcrowd) 's Twitter Profile Photo

Permission hierarchies hide more than just IDORs. Keep an eye out for complexion hierarchies and surface IDORs, understanding those levels is how you land the big finds 🤑 🎥: Katie Paxton-Fear youtube.com/watch?v=-MsjH-…

𝕏 Bug Bounty Writeups 𝕏 (@bountywriteups) 's Twitter Profile Photo

Subdomain Takeover: Beyond Basics (From a Bug Bounty Hunter’s Perspective) sukhveersingh97997.medium.com/subdomain-take… #bugbounty #bugbountytips #bugbountytip

Johann Rehberger (@wunderwuzzi23) 's Twitter Profile Photo

Also recommend watching this Black Hat talk to see how, with long-term storage and ability to communicate with an external server, an adversary can continuously remote control and provide new instructions to an agent. The ZombAIs are coming! m.youtube.com/watch?v=84NVG1…

gegul (@gfl2gexwrgjdkjm) 's Twitter Profile Photo

After reporting a $1.2M bug, I confirmed a pattern: newly deployed contracts often hide more issues. I upgraded BugChain.xyz to hunt them faster—search by address/name, deployed time, and funds to prioritize targets. Try it: bugchain.xyz

After reporting a $1.2M bug, I confirmed a pattern: newly deployed contracts often hide more issues. 
I upgraded BugChain.xyz to hunt them faster—search by address/name, deployed time, and funds to prioritize targets. 
Try it: bugchain.xyz
msuiche (@msuiche) 's Twitter Profile Photo

Thank you. Just wrote a quick blogpost and added some detection steps into ELEGANTBOUNCER msuiche.com/posts/detectin…

Cyber Detective💙💛 (@cyb_detective) 's Twitter Profile Photo

First YouTube Comment Finder Free online tool, show exact time and author nickname. tubepilot.ai/tools/first-co… *The first comments on posts and videos are often left by the author's close friends. Therefore, finding them can be useful for investigations on all social networks.

First YouTube Comment Finder

Free online tool, show exact time and author nickname.

tubepilot.ai/tools/first-co…

*The first comments on posts and videos are often left by the author's close friends. Therefore, finding them can be useful for investigations on all social networks.
Florian Hansemann (@cyberwarship) 's Twitter Profile Photo

''What Comes After Detection Rules? Smarter Detection Strategies in ATT&CK'' #infosec #pentest #redteam #blueteam medium.com/mitre-attack/s…

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🛏️ From Naptime to Big Sleep: Using LLMs To Catch Vulnerabilities In Real-World Code Blog: googleprojectzero.blogspot.com/2024/10/from-n… author: Google Project Zero / The Big Sleep Team #infosec

🛏️ From Naptime to Big Sleep: Using LLMs To Catch Vulnerabilities In Real-World Code

Blog: googleprojectzero.blogspot.com/2024/10/from-n…

author: Google Project Zero / The Big Sleep Team

#infosec