Mohammed Sami (@jizen0x01) 's Twitter Profile
Mohammed Sami

@jizen0x01

Offensive Security | Malware Research | AI/ML

ID: 1181267218514026499

linkhttp://jizen0x01.github.io calendar_today07-10-2019 17:57:26

67 Tweet

228 Followers

1,1K Following

the_storm (@the_st0rm) 's Twitter Profile Photo

We just released a blog post about our Python Static analyser tool (Pysa) It is very similar to Zoncolan, but open sourced with configurations ready for you to use in your Django, Tornado or flask projects :) Give it a try! Let us know your feedback engineering.fb.com/security/pysa/

Tib3rius (@0xtib3rius) 's Twitter Profile Photo

Are you an #OSCP student that, like me, couldn't find any decent buffer overflow binaries with badchars other that \x00, \x0a, and \x0d? Want to practice for the exam without setting up your own VM? Well here's a new (free) @RealTryHackMe room for you: tryhackme.com/jr/oscpbuffero…

Nuclei by ProjectDiscovery (@pdnuclei) 's Twitter Profile Photo

Here is how #subfinder can be used to quickly extract the low-level subdomains of any given subdomain. ./subfinder -d news.yahoo.com -recursive #bugbountytips #recon

RIVER (@wugeej) 's Twitter Profile Photo

A collection of over 300 Penetration Testing POC #CN #IOT #Mobile #WebAPP #Windows #Linux #Tool#Tutorials github.com/Mr-xn/Penetrat…

A collection of over 300 Penetration Testing POC  

#CN #IOT #Mobile #WebAPP #Windows #Linux #Tool#Tutorials 

github.com/Mr-xn/Penetrat…
Fady Othman (@fady_othman) 's Twitter Profile Photo

My write up for BugPoC challenge featuring a filter bypass without any encoding 😉 blog.fadyothman.com/solving-a-bugp… #bugbountytip

Mind Patch (@mindpatchsec) 's Twitter Profile Photo

ScanT3r - Scans all URLs with multiple HTTP Methods and Tries to look for bugs with basic exploits as XSS - SQLI - RCE - SSTI from Headers and URL Parameters By chaining waybackurls or gau github.com/knassar702/sca… #bugbountytips #recon #gau #waybackurls

👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

subfinder -d tesla.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | grep "tesla" @b51b5b43 Luke Stephens (hakluke) JS0N Haddix STÖK ✌️ ProjectDiscovery #bugbountytip #bugbounty

subfinder -d tesla.com -silent | httpx -timeout 3 -threads 300 --follow-redirects -silent | xargs -I% -P10 sh -c 'hakrawler -plain -linkfinder -depth 5 -url %' | grep "tesla"

@b51b5b43 <a href="/hakluke/">Luke Stephens (hakluke)</a> <a href="/Jhaddix/">JS0N Haddix</a> <a href="/stokfredrik/">STÖK ✌️</a> <a href="/pdiscoveryio/">ProjectDiscovery</a> 
#bugbountytip #bugbounty
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

./github-subdomains.py -t APIKEY -d att.com | httpx -silent | xargs -I@ -P20 sh -c 'gospider -a -s "@" -d 2' | grep -Eo "(http|https)://[^/\"].*.js+" | sed "s#\] \- #\n#g" | anew | grep "att.com" github.com/gwen001/github… @b51b5b43 STÖK ✌️

./github-subdomains.py -t APIKEY -d att.com | httpx -silent | xargs -I@ -P20 sh -c 'gospider -a -s "@" -d 2' | grep -Eo "(http|https)://[^/\"].*.js+" | sed "s#\] \- #\n#g" | anew | grep "att.com"

github.com/gwen001/github…

@b51b5b43 <a href="/stokfredrik/">STÖK ✌️</a>
👑 OFJAAAH 👑 (@ofjaaah) 's Twitter Profile Photo

Extract URL .apk 💀 🔥 apktool d com.uber -o uberApk;grep -Phro "(https?://)[\w\.-/]+[\"'\`]" uberApk/ | sed 's#"##g' | anew | grep -v "w3\|android\|github\|schemas.android\|google\|goo.gl" 🔥 @b51b5b43 STÖK ✌️ JS0N Haddix Ben Sadeghipour TomNomNom

Extract URL .apk 💀
🔥 apktool d com.uber -o uberApk;grep -Phro "(https?://)[\w\.-/]+[\"'\`]" uberApk/ | sed 's#"##g' | anew | grep -v "w3\|android\|github\|schemas.android\|google\|goo.gl" 🔥

@b51b5b43 <a href="/stokfredrik/">STÖK ✌️</a> <a href="/Jhaddix/">JS0N Haddix</a> <a href="/NahamSec/">Ben Sadeghipour</a> <a href="/TomNomNom/">TomNomNom</a>
shubs (@infosec_au) 's Twitter Profile Photo

I wrote a post on Assetnote's blog about hacking in bug bounties for the last four years. This should give you a good idea on what I've been reporting and how I find bugs and incorporate them back into our platform. blog.assetnote.io/2020/09/15/hac…

Youssef A. Mohamed (@generaleg64) 's Twitter Profile Photo

I'm happy to announce that I'm now officially Attify Certified IoT Security Pentester. I've spent the last few months studying and kicking off my journey into this amazing exclusive field. (IoT , SDR, Hardware, Embedded Systems, Binary reversing..etc) #IoTSecurity #GeneralEG

I'm happy to announce that I'm now officially <a href="/attifyme/">Attify</a>  Certified IoT Security Pentester.
I've spent the last few months studying and kicking off my journey into this amazing exclusive field.
(IoT , SDR, Hardware, Embedded Systems, Binary reversing..etc)
#IoTSecurity 
#GeneralEG
Ahsan Khan (@hunter0x7) 's Twitter Profile Photo

Github org:Target "bucket_name" org:Target "aws_access_key" org:Target "aws_secret_key" org:Target "S3_BUCKET" org:Target "S3_ACCESS_KEY_ID" org:Target "S3_SECRET_ACCESS_KEY" org:Target "S3_ENDPOINT" org:Target "AWS_ACCESS_KEY_ID" org:Target "list_aws_accounts"

Sayed Abdelhafiz (@dphoeniixx) 's Twitter Profile Photo

Hey, Interested in mobile application security? You should read the following topic about request forgery in mobile applications! dphoeniixx.com/2020/12/13-2/

PentesterLab (@pentesterlab) 's Twitter Profile Photo

Giveaway time! We are going to send a t-shirt and few goodies to one person who follows PentesterLab and likes this tweet !! And we are going to give a 1-year voucher to someone who RT this tweet!