Vishal Sharma (@vishne0) 's Twitter Profile
Vishal Sharma

@vishne0

Hacker, Hustler, Security expert, Influencer, Author (Beginning Elastic Stack). #Security #infosec #Author #appsec #cybersecurity

ID: 443557785

linkhttp://www.hashmetrics.digital calendar_today22-12-2011 09:06:24

184,184K Tweet

6,6K Takipçi

4,4K Takip Edilen

Vishal Sharma (@vishne0) 's Twitter Profile Photo

Hackers steal 33 TB of ‘juicy’ information containing Americans’ ‘banking secrets’ #cybersecurity #hacked #databreach #infosec #cybercrime flip.it/K0AiI-

Vishal Sharma (@vishne0) 's Twitter Profile Photo

Polyfill supply chain attack hits 100K+ sites #wordpress #vulnerability #polyfill #security #cybersecurity sansec.io/research/polyf…

BleepingComputer (@bleepincomputer) 's Twitter Profile Photo

TeamViewer's corporate network was breached in alleged APT hack - Lawrence Abrams bleepingcomputer.com/news/security/… bleepingcomputer.com/news/security/…

Vishal Sharma (@vishne0) 's Twitter Profile Photo

The Importance of Configuring Security Headers on Your Website shorturl.at/iTctb #security #securityheaders #cybersecurity #wordpress #infosecurity #infosec

Vishal Sharma (@vishne0) 's Twitter Profile Photo

AT&T reportedly gave $370,000 to a hacker to delete its stolen customer data shorturl.at/32a1d #security #cybersecurity #hacked #infosec #databreach

Olexander (@_aircorridor) 's Twitter Profile Photo

Secure Your Network with Nftables Nftables is a modern Linux firewall tool, that replaces iptables for powerful and efficient traffic management. Block IPs, restrict ports, or manage rules with simple commands - all FREE. hackers-arise.net/2024/09/04/lin… OccupytheWeb

Secure Your Network with Nftables

Nftables is a modern Linux firewall tool, that replaces iptables for powerful and efficient traffic management. Block IPs, restrict ports, or manage rules with simple commands - all FREE.
hackers-arise.net/2024/09/04/lin…
<a href="/three_cube/">OccupytheWeb</a>
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs! Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!

Here's a cool trick for y'all looking to create new Nuclei templates for exploitable CVEs!

Using CVEmap you can get a list of CVEs with public proofs of concept, that have been marked as exploitable by CISA, are remotely exploitable AND don't have a Nuclei template (yet)!
Kirill Firsov (@k_firsov) 's Twitter Profile Photo

How to bypass Cloudflare WAF? FearsOff Cybersecurity #bugbountytips #cloudflare #waf #bypass 1. Found an SQL injection but getting blocked by Cloudflare? Here's a pro tip 😏

How to bypass Cloudflare WAF?
<a href="/FearsOff/">FearsOff Cybersecurity</a> #bugbountytips #cloudflare #waf #bypass

1. Found an SQL injection but getting blocked by Cloudflare?
Here's a pro tip 😏
X (@themsterdoctor1) 's Twitter Profile Photo

🚨 1 COMMAND TO OWN AN ENTIRE NETWORK 🧠 Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped' ✅ Fast ✅ Silent ✅ Filters noise ✅ IDs Apache, IIS, embedded

🚨 1 COMMAND TO OWN AN ENTIRE NETWORK

🧠 Advanced Nmap Recon + Grep Filtering + Banner Fingerprinting

nmap -n -Pn -sS -sV -p80 --open --script=banner -T5 192.168.1.0/24 -oG - | grep 'open' | grep -v 'tcpwrapped'

✅ Fast
✅ Silent
✅ Filters noise
✅ IDs Apache, IIS, embedded
Md Santo (@codemdsanto) 's Twitter Profile Photo

Coding games are the best way to learn coding. From CSS, Python, JavaScript to Blockchain. Here are 10 of the BEST online games to learn coding in 2025:

Coding games are the best way to learn coding.

From CSS, Python, JavaScript to Blockchain.

Here are 10 of the BEST online games to learn coding in 2025:
SSD Secure Disclosure (@securiteam_ssd) 's Twitter Profile Photo

Curious how a bug in Linux’s ipset subsystem could lead to full kernel compromise? In our new article, we revisit CVE-2024-53141 to break down the bug, explore the memory layout, and show how it can be turned into a powerful privilege escalation.

Jami (@expertwith_ai) 's Twitter Profile Photo

Google loves keeping valuable websites hidden from you. Here are 35 AI websites you probably didn’t know existed (until now) ⬇️

Google loves keeping valuable websites hidden from you.

Here are 35 AI websites you probably didn’t know existed (until now) ⬇️
HackManac (@h4ckmanac) 's Twitter Profile Photo

🚨Data Breach Alert ‼️ Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details Source: cybersecuritynews.com/tenable-confir…

🚨Data Breach Alert ‼️

Tenable Confirms Data Breach – Hackers Accessed Customers’ Contact Details

Source:
cybersecuritynews.com/tenable-confir…
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

🚨npm Supply Chain Compromise Quoted directly from the LinkedIn post: LinkedIn: linkedin.com/posts/advocate… "URGENT: I can't write much..... but... the largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got

🚨npm Supply Chain Compromise

Quoted directly from the LinkedIn post:

LinkedIn: linkedin.com/posts/advocate…

"URGENT: I can't write much..... but... the largest supply chain compromise in npm, Inc. history just happened, packages with a total of 2 billion weekly downloads just got
HackerRats - Uncle Rat ❤️ (XSS Rat) (@thexssrat) 's Twitter Profile Photo

25 Essentials Every Bug Bounty Hunter Should Have Resource: thexssrat.podia.com/full-house-bun… - A Linux-ready laptop (Kali or Parrot) - Burp Suite Pro - Nmap - ffuf - SecLists - Subfinder - Amass - httpx - Naabu - dnsx or MassDNS - Nuclei - Interactsh or Burp Collaborator - Crunch or