Infoneeds (@infoneeds1) 's Twitter Profile
Infoneeds

@infoneeds1

ID: 1278726700667305984

calendar_today02-07-2020 16:26:29

1,1K Tweet

44 Followers

287 Following

Youssef Sammouda (sam0) (@samm0uda) 's Twitter Profile Photo

Leaking FXAuth Token leading to account takeover ($65,000) ysamm.com/uncategorized/… Instagram account takeover via Facebook Pixel script abuse ($32,500) ysamm.com/uncategorized/… Multiple XS-leaks disclosing Facebook users in third-party websites ($8,400) ysamm.com/uncategorized/…

Leaking FXAuth Token leading to account takeover ($65,000)
ysamm.com/uncategorized/…
Instagram account takeover via Facebook Pixel script abuse ($32,500)
ysamm.com/uncategorized/…
Multiple XS-leaks disclosing Facebook users in third-party websites ($8,400)
ysamm.com/uncategorized/…
Aditya Shende (@adityashende17) 's Twitter Profile Photo

Bug Bounty Tip: AI Chatbots 1.Identify websites using AI chatbots integrated with CRMs 2.Chatbots commonly request name, email, and phone number 3.Name and phone fields often lack proper length validation 4.Inject a very long string; bot attempts to reply with it

Bug Bounty Tip: AI Chatbots
1.Identify websites using AI chatbots integrated with CRMs
2.Chatbots commonly request name, email, and phone number
3.Name and phone fields often lack proper length validation
4.Inject a very long string; bot attempts to reply with it
X (@themsterdoctor1) 's Twitter Profile Photo

🚨 ALL FREE CERTIFICATION RESOURCES 🚨 No paywalls. No BS. Just value. 📘 AWS 👉 drive.google.com/drive/mobile/f… 🔐 CISSP 👉 drive.google.com/drive/mobile/f… 🛡️ CISA 👉 drive.google.com/drive/mobile/f… 📊 CISM 👉 drive.google.com/drive/mobile/f… ⚠️ CRISC 👉 drive.google.com/drive/mobile/f… 🌐 CCDA 👉

Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

🤯A Really Awesome Guide on JavaScript Analysis for Pentesters Blog: kpwn.de/2023/05/javasc… Author: Konstantin #infosec

🤯A Really Awesome Guide on JavaScript Analysis for Pentesters 

Blog: kpwn.de/2023/05/javasc…

Author: Konstantin

#infosec
Rootkit Randy (@ezesecops) 's Twitter Profile Photo

Exam Voucher Giveaway Prize: CISSP How to enter: - Follow me - Retweet this post Picking a winner in 7 days. Good luck! (Please make sure your DMs are open)

Exam Voucher Giveaway

Prize: CISSP 

How to enter:
- Follow me
- Retweet this post 

Picking a winner in 7 days.

Good luck! 

(Please make sure your DMs are open)
Md Ismail Šojal 🕷️ (@0x0sojalsec) 's Twitter Profile Photo

Hands-On Large Language Models:🤞 It covers : Chapter 1: Introduction to Language Models Chapter 2: Tokens and Embeddings Chapter 3: Looking Inside Transformer LLMs Chapter 4: Text Classification Chapter 5: Text Clustering and Topic Modeling Chapter 6: Prompt Engineering

Hands-On Large Language Models:🤞

It covers : 

Chapter 1: Introduction to Language Models
Chapter 2: Tokens and Embeddings
Chapter 3: Looking Inside Transformer LLMs
Chapter 4: Text Classification
Chapter 5: Text Clustering and Topic Modeling
Chapter 6: Prompt Engineering
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

GIVEAWAY TIMEEEE. udemy.com/course/the-ult… udemy.com/course/the-ult… udemy.com/course/the-ult… Please rate my course, ratings are sooooo important, if it is bad you can say it but a why would be very much appriciated!!

HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

1 rat ... 1 lifetime ... 1 opportunity ;-) - Security testing repo: github.com/The-XSS-Rat/Se… - Subscraper repo: github.com/The-XSS-Rat/su… - Hackxpert-brute repo: github.com/The-XSS-Rat/ha… - RatDo Repo: github.com/The-XSS-Rat/Ra… - RatPetShop repo: github.com/The-XSS-Rat/Ra… - Medium:

NullSecX (@nullsecurityx) 's Twitter Profile Photo

Bug Bounty Recon 101 | Advanced Techniques, Tools, Workflow & Mindset Recon → endpoints → parameters → attack surface → vuln.. Here’s the complete Bug Bounty recon methodology I actually use. ▶️ youtu.be/cht1SXF5Mfo #BugBounty #CyberSecurity

Zierax (@zierax_x) 's Twitter Profile Photo

new tool: grafana scanner with 10 CVE checks from 2018-2025 made it cause existing ones give too many false positives. github.com/Zierax/Grafana… #Pentesting #InfoSec #BugBounty #bugbountytips #Hacking #EthicalHacking

new tool: grafana scanner with 10 CVE checks from 2018-2025 
made it cause existing ones give too many false positives.

github.com/Zierax/Grafana…

#Pentesting #InfoSec #BugBounty #bugbountytips #Hacking #EthicalHacking
DataFuel (@datafuel0) 's Twitter Profile Photo

Another CSP bypass🔥🔥 TL;DR: Found CSP: script-src 'self' blob: 'unsafe-eval' *.reduced.com vendorlist.consensu.org....etc I copied csp and pasted it in cspbypass.com and got this payload : <script src="geolocation.onetrust.com/cookieconsentp…"></script>

Another CSP bypass🔥🔥
TL;DR:
Found CSP: script-src 'self' blob: 'unsafe-eval' *.reduced.com vendorlist.consensu.org....etc
I copied csp and pasted it in cspbypass.com and got this payload : &lt;script src="geolocation.onetrust.com/cookieconsentp…"&gt;&lt;/script&gt;
Aditya Shende (@adityashende17) 's Twitter Profile Photo

Recon Smarter: Finding Sensitive Files in Large URL Lists Most bug hunters stop at URLs. Real impact comes from what those URLs expose. This workflow combines: • high-risk file extensions • real-world secret patterns • automated URL discovery Result → fewer URLs, higher

Recon Smarter: Finding Sensitive Files in Large URL Lists
Most bug hunters stop at URLs.
 Real impact comes from what those URLs expose.
This workflow combines:
 • high-risk file extensions
 • real-world secret patterns
 • automated URL discovery
Result → fewer URLs, higher
Nicolas Krassas (@dinosn) 's Twitter Profile Photo

After 5 months of development, I'm releasing EvilWAF v2.4 - a MITM proxy that makes ANY tool bypass WAFs github.com/matrixleons/ev…

Ben Sadeghipour (@nahamsec) 's Twitter Profile Photo

I'm documenting my journey of learning how to hack LLMs and building with AI so I'm so excited for this week's video: BECOMING AN AI HACKER (Episode 1) 👉🏼 youtu.be/dG6NFXQOmsE

I'm documenting my journey of learning how to hack LLMs and building with AI so I'm so excited for this week's video: BECOMING AN AI HACKER (Episode 1)  👉🏼 youtu.be/dG6NFXQOmsE
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

Here are 50 essential bug bounty techniques for your 2026 methodology: Subdomain Takeover (CNAME Verification) BOLA / IDOR (Broken Object Level Authorization) BFLA (Broken Function Level Authorization) JWT Algorithm Confusion (RS256 to HS256) JWT None Algorithm Bypass HTTP