Arfaoui Mohamed (@h4ma_tn) 's Twitter Profile
Arfaoui Mohamed

@h4ma_tn

CTF player @FwordTeam
Cybersecurity enthusiast

ID: 998688448457428992

linkhttps://mohamed-arfaoui.me/ calendar_today21-05-2018 22:14:15

84 Tweet

175 Followers

249 Following

Censored Men (@censoredmen) 's Twitter Profile Photo

🇷🇴🇮🇱 A Romanian journalist in Israel ducks for cover from Hamas rockets… Yet people casually walk and cycle in the background.

Mobile Hacker (@androidmalware2) 's Twitter Profile Photo

Car Hacking using Flipper Zero and HackRF Both blogs present in depth research and testing of common methods of hacking fixed-code and rolling codes of radio frequency locks using replay attacks, brute-force, signal jamming, RollJAM, Rolling-PWN and Keeloq Decryption by

Car Hacking using Flipper Zero and HackRF

Both blogs present in depth research and testing of common methods of hacking fixed-code and rolling codes of radio frequency locks using replay attacks, brute-force, signal jamming, RollJAM, Rolling-PWN and Keeloq Decryption by
Thomas Roccia 🤘 (@fr0gger_) 's Twitter Profile Photo

Okay, I've created an "awesome repository" that lists all the GPTs related to cybersecurity. Take a look – the list is continuously growing and there are already many use cases! Feel free to add yours 👇#gpt #infosec #Agents github.com/fr0gger/Awesom…

Okay, I've created an "awesome repository" that lists all the GPTs related to cybersecurity. Take a look – the list is continuously growing and there are already many use cases! Feel free to add yours 👇#gpt #infosec #Agents

github.com/fr0gger/Awesom…
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🔍Question of the day: Where to find SSRF Issues? Many overlook testing for SSRF vulnerabilities, thinking they're complex and beyond their capabilities. 💻💔 However, these issues can lead to bounties ranging from $1000 to $15000, depending on the Impact. These are the top 5

🔍Question of the day: Where to find SSRF Issues?

Many overlook testing for SSRF vulnerabilities, thinking they're complex and beyond their capabilities. 💻💔 However, these issues can lead to bounties ranging from $1000 to $15000, depending on the Impact.

These are the top 5
Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

2/ The target app was exclusively using application/json. A typical request looked like this: Request: POST /v1/organizations/ HTTP/1.1 Host: target(.)com Content-Type: application/json {"search":"Id","value":"1"} Response: {"description": "ID 1 not found"}

Jayesh Madnani (@jayesh25_) 's Twitter Profile Photo

🤔Question of the day: How to Spot CORS Misconfigurations? It is almost year 2024, yet I continue to discover CORS misconfigurations, adding $$$ to my bug bounty earnings each month. Here's my approach to finding CORS Issues: 1️⃣ Nuclei Scan - Identify vulnerable targets with

🤔Question of the day: How to Spot CORS Misconfigurations?

It is almost year 2024, yet I continue to discover CORS misconfigurations, adding $$$ to my bug bounty earnings each month.

Here's my approach to finding CORS Issues:

1️⃣ Nuclei Scan - Identify vulnerable targets with
Binni Shah (@binitamshah) 's Twitter Profile Photo

apk.sh : a Bash script that makes reverse engineering Android apps easier by automating repetitive tasks like pulling, decoding, rebuilding and patching an APK : github.com/ax/apk.sh

علماء السلطان (@hdmshk2) 's Twitter Profile Photo

عائض القرني: الأتراك هم من نشروا الاسلام وأدخلوه أوروبا وحموه من جاكرتا إلى نواكشوط. لكن بعد سنوات!!! الاتراك غزاة محتلين وقتلوا فينا ولم يأتوا بالزرع والتعليم.

S3cur3Th1sSh1t (@shitsecure) 's Twitter Profile Photo

This year it happened. What started as a spare time hobby and fun project became a commercial product for the Offensive Security community. I founded a company, MSec Operations . And this company will sell a Packer to Red Teams or Pentesters. (1/x) 🔥