⚡️ (@infoseczone) 's Twitter Profile
⚡️

@infoseczone

Bringing all ethical hackers together on Infosec Zone! Follow us to stay updated with the hacker community.

ID: 1002648566622498816

calendar_today01-06-2018 20:30:21

212 Tweet

475 Followers

1,1K Following

⚡️ (@infoseczone) 's Twitter Profile Photo

🫓 How to Find Subdomain Takeover Blog: systemweakness.com/how-to-find-su… credit: Reek Elderblod #BugBounty #bugbountytips #cybersecurity

⚡️ (@infoseczone) 's Twitter Profile Photo

📰 Reports from various areas of information security Github: github.com/CyberSecurityU… #BugBounty #bugbountytips #cybersecurity

⚡️ (@infoseczone) 's Twitter Profile Photo

➡️ Trace URL redirects with Redirect Detective, a free tool to uncover hidden, potentially malicious sites behind shortened links. Website: redirectdetective.com #OSINT #infosec #cybersecurity

⚡️ (@infoseczone) 's Twitter Profile Photo

🤩 $15k RCE Through Monitoring Debug Mode Blog: medium.com/@0xold/15k-rce… credit: Omar #bugbountytips #hacking #cybersecurity

⚡️ (@infoseczone) 's Twitter Profile Photo

🔎 Osint.rock: an easy-to-use collection of email, phone number, and whois lookup tools. Website: osint.rocks #OSINT #investigation #reconnaissance #infosec #cybersecurity

⚡️ (@infoseczone) 's Twitter Profile Photo

⚙️ Dork Engine – Open multiple Google Dorks with a click, making vulnerability discovery and sensitive info hunting faster and easier. URL: github.com/dorkengine/dor… #bugbountytips #bugbounty #hacking

⚡️ (@infoseczone) 's Twitter Profile Photo

IPA: GUI analyzer for deep-diving into PDF files. Detect malicious payloads, understand object relationships, and extract key information for threat analysis Github: github.com/seekbytes/IPA #infosec #malware #bugbountytips

⚡️ (@infoseczone) 's Twitter Profile Photo

🔆 goGetJS: a tool for extracting, searching, and saving JavaScript files (with optional headless browser) Github: github.com/davemolk/goGet… #bugbountytips #infosec #CyberSecurity

Hunter (@huntermapping) 's Twitter Profile Photo

🚨Alert🚨CVE-2024-37288/CVE-2024-37285: Critical Kibana Flaws Expose Systems to Arbitrary Code Execution 📊 33.9K+ Services are found on hunter.how yearly 🔗Hunter Link:hunter.how/list?searchVal… 👇Search Query HUNTER:/product.name="Elastic Kibana" FOFA: app="Kibana"

🚨Alert🚨CVE-2024-37288/CVE-2024-37285: Critical Kibana Flaws Expose Systems to Arbitrary Code Execution
📊 33.9K+ Services are found on hunter.how yearly
🔗Hunter Link:hunter.how/list?searchVal…
👇Search Query
HUNTER:/product.name="Elastic Kibana"
FOFA: app="Kibana"
⚡️ (@infoseczone) 's Twitter Profile Photo

🔆 How to Hunt for Sensitive Directories in Bug Bounty Hunting bughunteralltime.medium.com/how-to-hunt-fo… #cybersecurity #infosec #bugbountytips

⚡️ (@infoseczone) 's Twitter Profile Photo

📲 Practical Incident Response - Active Directory Blog: nxb1t.github.io/retype/inciden… #infosec #hacking #bugbountytips

⚡️ (@infoseczone) 's Twitter Profile Photo

msiscan: Scanning tool for identifying local privilege escalation issues in vulnerable MSI installers Github: github.com/sec-consult/ms… #bugbountytips

⚡️ (@infoseczone) 's Twitter Profile Photo

Debuggers 1011: Introductory WinDbg [OpenSecurityTraining2] Free Course: p.ost2.fyi/courses/course… #infosec #cybersecurity