bytehx (@bytehx343) 's Twitter Profile
bytehx

@bytehx343

ID: 1059652571084730368

calendar_today06-11-2018 03:43:55

2,2K Tweet

2,2K Followers

1,1K Following

Horizon3 Attack Team (@horizon3attack) 's Twitter Profile Photo

Today, we are disclosing the details of 4 vulns effecting #Ivanti #EPM which allow an unauth attacker to coerce the machine credential of the EPM server to be used in relay attacks. horizon3.ai/attack-researc… Depending on the environment, compromising the EPM server may be

Gareth Heyes \u2028 (@garethheyes) 's Twitter Profile Photo

We've just released Shadow Repeater, for AI-enhanced manual testing. Simply use Burp Repeater as you normally would, and behind the scenes Shadow Repeater will learn from your attacks, try payload permutations, and report any discoveries via Organizer.

Jason Haddix (@jhaddix) 's Twitter Profile Photo

Introducing MSFTrecon - MSFTRecon is a reconnaissance tool designed for red teamers and security professionals to map Microsoft 365 and Azure tenant infrastructure. It performs enumeration without requiring authentication, helping identify potential security misconfigurations

Introducing MSFTrecon -

MSFTRecon is a reconnaissance tool designed for red teamers and security professionals to map Microsoft 365 and Azure tenant infrastructure. It performs enumeration without requiring authentication, helping identify potential security misconfigurations
Jenish Sojitra (@_jensec) 's Twitter Profile Photo

Publishing new free tool for bug bounty hunters and IT teams 🎉 crxplorer.com We've built a tool that takes a Chrome Web Store URL as input, fetches the code and manifest file, checks permissions, and reviews them via LLM. Using this, I've found numerous issues in

Publishing new free tool for bug bounty hunters and IT teams 🎉

crxplorer.com

We've built a tool that takes a Chrome Web Store URL as input, fetches the code and manifest file, checks permissions, and reviews them via LLM.

Using this, I've found numerous issues in
SickSec 🇲🇦 🇵🇸 (@originalsicksec) 's Twitter Profile Photo

Just dropped a 🔥 in-depth breakdown of the Facebook OAuth 0-day exploit! Big props to Soufiane el habti for teaming up on this one! 🚀 Security testing just leveled up! 💥 #BugBounty #Meta #infosec sicks3c.github.io/posts/ato-via-…

bytehx (@bytehx343) 's Twitter Profile Photo

I am releasing Ollama AI analyzer burp extension. It runs right on your local computer and uses Ollama's AI models to analyze your HTTP requests and response while keeping your data private. github.com/byt3hx/ollama-…

I am releasing Ollama AI analyzer burp extension. It runs right on your local computer and uses Ollama's AI models to analyze your HTTP requests and response while keeping your data private.

github.com/byt3hx/ollama-…
HAHWUL (@hahwul) 's Twitter Profile Photo

OWASP Noir v0.20.0 is here🥳 Previously Ollama-only, now supporting local LLMs (Ollama, vLLM, LM Studio), online platforms (OpenAI, xAI, GitHub Models), and our OpenAI-style APIs for more endpoints. github.com/owasp-noir/noi… #SAST #Security #DevSecOps #Noir

OWASP Noir v0.20.0 is here🥳

Previously Ollama-only, now supporting local LLMs (Ollama, vLLM, LM Studio), online platforms (OpenAI, xAI, GitHub Models), and our OpenAI-style APIs for more endpoints.

github.com/owasp-noir/noi…

#SAST #Security #DevSecOps #Noir
Sanjai Kumar (@th3sanjai) 's Twitter Profile Photo

🚀 Dnsprober v1.0.0 is here! 🎉 A fast, lightweight, and scalable DNS reconnaissance tool with UDP support and TCP fallback. Built for efficiency, concurrency, and reliability. install now: github.com/RevoltSecuriti… #dnsprober #bugbounty #bugbountytips

🚀 Dnsprober v1.0.0 is here! 🎉

A fast, lightweight, and scalable DNS reconnaissance tool with UDP support and TCP fallback. Built for efficiency, concurrency, and reliability.

install now: github.com/RevoltSecuriti…
#dnsprober #bugbounty  #bugbountytips
Intigriti (@intigriti) 's Twitter Profile Photo

Checkout systems can get complex... 😓 In our recently rewritten article, we documented 6 different ways to bypass checkout systems and place orders for free! 😎 Read the article on our blog 👇 buff.ly/D8avs1H

Checkout systems can get complex... 😓

In our recently rewritten article, we documented 6 different ways to bypass checkout systems and place orders for free! 😎

Read the article on our blog 👇
buff.ly/D8avs1H
Sergey Bobrov (@black2fan) 's Twitter Profile Photo

I have published a tool based on jadx that helps analyze Java applications. github.com/BlackFan/BFScan BFScan generates HTTP requests and OpenAPI specs based on config files and class/method annotations. It also searches strings that look like URIs, paths, or secrets.

shubs (@infosec_au) 's Twitter Profile Photo

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…

We recently looked deeper at the authentication bypass vulnerability in Next.js (CVE-2025-29927) and discovered some intelligent and comprehensive ways to check for the vulnerability. Read more in our blog post: slcyber.io/assetnote-secu…
YesWeHack ⠵ (@yeswehack) 's Twitter Profile Photo

Exploits often fail because payloads are blocked before they even reach the target ❌ Learn how to disguise your scripts with payload obfuscation techniques such as URL encoding, variable expression assignment and obfuscation in shell environments 👇 yeswehack.com/learn-bug-boun…

Vertigo_Warrior (@vertigowarrior) 's Twitter Profile Photo

Heartbreaking News💔 A massive 7.7 quake devastates Mandalay, Myanmar, and impacts Bangkok, Thailand. A Thread Not for the soft-hearted ⚠️

Heartbreaking News💔

A massive 7.7 quake devastates Mandalay, Myanmar, and impacts Bangkok, Thailand.

A Thread Not for the soft-hearted ⚠️
zhero; (@zhero___) 's Twitter Profile Photo

new paper on a vulnerability discovered in React Router, resulting from a collaboration with inzo that led to CVE-2025-31137; React Router and the Remix'ed path zhero-web-sec.github.io/research-and-t… good reading

new paper on a vulnerability discovered in React Router, resulting from a collaboration with <a href="/inzo____/">inzo</a> that led to CVE-2025-31137;

React Router and the Remix'ed path

zhero-web-sec.github.io/research-and-t…

good reading