DEFCON DC8802🇧🇩 (@defcon8802) 's Twitter Profile
DEFCON DC8802🇧🇩

@defcon8802

DC8802 official DEFCON group in Dhaka,Bangladesh.Get more information in @defcongroups

ID: 1347029910167064580

calendar_today07-01-2021 03:59:07

907 Tweet

46 Followers

248 Following

bugcrowd (@bugcrowd) 's Twitter Profile Photo

A list of payloads to detect XSS vulnerabilities: 🐞 XSS in HTML/Applications 🐛 XSS in wrappers javascript and data URI 🐜 XSS in files 🦟 XSS in PostMessage 🪲 Filter Bypass and exotic payloads And more! 👇 swisskyrepo.github.io/PayloadsAllThe…

Vulncure (@vulncure) 's Twitter Profile Photo

Bug Report as Document Apache Tomcat : • 🐞 BUG: HTTP Request Smuggling • 📄 CVE ID: 2024-21733 | CWE: 444 Detailed Documentation : vulncure.com/cve-2024-21733/

Bug Report as Document

Apache Tomcat :
• 🐞 BUG: HTTP Request Smuggling
• 📄 CVE ID: 2024-21733 | CWE: 444

Detailed Documentation : vulncure.com/cve-2024-21733/
TryHackMe (@realtryhackme) 's Twitter Profile Photo

[Swag Giveaway] What challenges do you face while learning on TryHackMe? 👉Answer here for the chance to WIN a swag pack: forms.gle/53Nap2vfvRaLA3… The winner will be chosen soon!

Bug X Hunter 💻 (@bug_x_hunter) 's Twitter Profile Photo

💻 Bug Bounty Methodology — Step By Step Guide To Find Subdomains And Vulnerable URLs 💻 👉🏻 Writeup 🖇️: medium.com/@shaikhminhaz1…

Hacking Articles (@hackinarticles) 's Twitter Profile Photo

Digital Forensics Tools Cheat Sheet 🔴⚫️Full HD Image: github.com/Ignitetechnolo… #infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips

Digital Forensics Tools Cheat Sheet

🔴⚫️Full HD Image: github.com/Ignitetechnolo…

#infosec #cybersecurity #pentesting #redteam #informationsecurity #CyberSec #networking #networksecurity #infosecurity #cyberattacks #security #linux #cybersecurityawareness #bugbounty #bugbountytips
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

Is democracy at risk? 🗳️ With external actors trying to compromise both US #presidential campaign committees, it's more urgent than ever to understand the attack techniques, and procedures used. Learn about successfully protecting critical infrastructures: okt.to/rhnWbV

Is democracy at risk? 🗳️
With external actors trying to compromise both US #presidential campaign committees, it's more urgent than ever to understand the attack techniques, and procedures used. Learn about successfully protecting critical infrastructures: okt.to/rhnWbV
Hack The Box (@hackthebox_eu) 's Twitter Profile Photo

Challenge time ⏰ Can you identify the vulnerability in the snippet below? Share your answer in the thread! #HackTheBox #HTB #Cybersecurity #InformationSecurity #Cybersec

Challenge time ⏰
Can you identify the vulnerability in the snippet below? Share your answer in the thread!

#HackTheBox #HTB #Cybersecurity #InformationSecurity #Cybersec
bugcrowd (@bugcrowd) 's Twitter Profile Photo

💁 New recon tricks, who dis? Hacker OrwaGodfather is taking over on our #YouTube channel to show you some fresh and precise methods that might just change the way you approach security. Check it out to get inspired! 👀 Watch the full video: youtu.be/5RyODeBjar4

Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Top 50 Digital Forensics Tools Network Forensic Tools - Nmap - Wireshark - Xplico - Snort - TCPDump - The Slueth Kit Mobile Forensics Tools - Elcomspoft iOS Forensic Toolkit - Mobile Verification Toolkit - Oxygen Forensic - MOBILedit - Cellebrite UFED - MSAB XRY Malware