Phishing Radar (@pointerradar) 's Twitter Profile
Phishing Radar

@pointerradar

Linux | Ethical Hacker | Security Enthusiast | Python | Bug Hunter | sushi lover | 🍣 👾 🤖 🇨🇴

ID: 1326886456942612487

calendar_today12-11-2020 13:56:33

1,1K Tweet

125 Followers

2,2K Following

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Evaluation of different tools for routers firmware emulation (FACT, QEMU, EMUX, Qiling, Firmadyne, FAT, FirmAE, Pandawan, and EMBA) skemman.is/bitstream/1946… #cybersecurity #embedded

Evaluation of different tools for routers firmware emulation
(FACT, QEMU, EMUX, Qiling, Firmadyne, FAT, FirmAE, Pandawan, and EMBA)

skemman.is/bitstream/1946…

#cybersecurity #embedded
VIEH Group (@viehgroup) 's Twitter Profile Photo

Wordlists specially for API routes fuzzing 📒 wordlists-cdn.assetnote.io/data/automated/ #infosec #cybersec #bugbountytips #bugbounty

Wordlists specially for API routes fuzzing 📒 

wordlists-cdn.assetnote.io/data/automated/ 

#infosec #cybersec #bugbountytips #bugbounty
NullSecX (@nullsecurityx) 's Twitter Profile Photo

🔍 Bug Bounty Tip: WAF Bypass Evade WAF’s URL normalization with double encoding (%252f) or unusual paths. Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets-- Test only on authorized systems! 🛡️ #Cybersecurity #BugBounty

🔍 Bug Bounty Tip: WAF Bypass
Evade WAF’s URL normalization with double encoding (%252f) or unusual paths.

Example: /api/v1/%2e%2e/%2e%2e/config?id=1%252bUNION%252bSELECT%252bsecrets--

Test only on authorized systems! 🛡️ #Cybersecurity #BugBounty
Tech Enthusiast (@ctprecious) 's Twitter Profile Photo

Super excited to announce #WebRecon - an OSINT website recon tool - Extracts emails, subdomains, tech stacks automatically - Identifies cloud storage leaks & exposed files - Built-in FireProx for IP rotation - JavaScript rendering with Playwright, etc #Cybersecurity #OSINT

Super excited to announce #WebRecon - an OSINT website recon tool

- Extracts emails, subdomains, tech stacks automatically
- Identifies cloud storage leaks & exposed files
- Built-in FireProx for IP rotation
- JavaScript rendering with Playwright, etc

#Cybersecurity #OSINT
Clandestine (@akaclandestine) 's Twitter Profile Photo

GitHub - t3l3machus/PowerShell-Obfuscation-Bible: A collection of techniques, examples and a little bit of theory for manually obfuscating PowerShell scripts to achieve AV evasion, compiled for educational purposes. The contents of this repository github.com/t3l3machus/Pow…

Miguel Ángel Durán (@midudev) 's Twitter Profile Photo

Se ha filtrado todo el código fuente de la web de la Apple App Store. Se olvidaron de desactivar los Source Maps y es totalmente legible, con comentarios incluidos: github.com/rxliuli/apps.a…

Se ha filtrado todo el código fuente de la web de la Apple App Store. Se olvidaron de desactivar los Source Maps y es totalmente legible, con comentarios incluidos:
github.com/rxliuli/apps.a…
𐰚𐰼𐰇𐱅 (@ynsmroztas) 's Twitter Profile Photo

I created a simple but effective tool that examines and analyzes .js files. 🔗 Project: github.com/ynsmroztas/Ins… #DevTools #Js #JavaScript #bugbountytip #bugbountytips #InfoSec #recon

I created a simple but effective tool that examines and analyzes .js files.
🔗 Project: github.com/ynsmroztas/Ins…

#DevTools #Js #JavaScript #bugbountytip #bugbountytips #InfoSec #recon
0b1d1 (@_0b1d1) 's Twitter Profile Photo

🔒 SOC Analyst (L1–L2) Preparation Guide 📘 💬 Comment “PDF” if you’d like to get the guide! I’ve just uploaded a comprehensive PDF guide designed for anyone preparing to become a Cybersecurity / SOC Analyst (Level 1–2).

🔒 SOC Analyst (L1–L2) Preparation Guide 📘

💬 Comment “PDF” if you’d like to get the guide!

I’ve just uploaded a comprehensive PDF guide designed for anyone preparing to become a Cybersecurity / SOC Analyst (Level 1–2).
Mobile Hacker (@androidmalware2) 's Twitter Profile Photo

How to build Android Bug Bounty lab Guide to configuring emulators, real devices, proxies, Magisk, Burp, Frida by YesWeHack ⠵ yeswehack.com/learn-bug-boun…

How to build Android Bug Bounty lab

Guide to configuring emulators, real devices, proxies, Magisk, Burp, Frida by <a href="/yeswehack/">YesWeHack ⠵</a>  
yeswehack.com/learn-bug-boun…
Muqsit 𝕏 (@mqst_) 's Twitter Profile Photo

📝 List of blogs and guides to Master Insecure Deserialization. 1. book.hacktricks.xyz/pentesting-web… 2. greyshell.github.io/blog/2019/11/2… 3. snyk.io/blog/preventin…

📝 List of blogs and guides to Master Insecure Deserialization.

1. book.hacktricks.xyz/pentesting-web…
2. greyshell.github.io/blog/2019/11/2…
3. snyk.io/blog/preventin…
Intigriti (@intigriti) 's Twitter Profile Photo

Found a target that actively uses the 'kid' JWT header parameter? Make sure to test for injection attacks, such as SQLi! 🤠 Here's how: 1. Decode the header 2. Inject your SQLi payload into the 'kid' parameter 3. Modify the JWT claims (payload) 4. Sign your JWT using your

Found a target that actively uses the 'kid' JWT header parameter? Make sure to test for injection attacks, such as SQLi! 🤠

Here's how:
1. Decode the header
2. Inject your SQLi payload into the 'kid' parameter
3. Modify the JWT claims (payload)
4. Sign your JWT using your
kelvinlina𖤍✨ (@cybergirl_io) 's Twitter Profile Photo

200+books on info sec and cybersecurity. Feel free to download any and read. LINK: drive.google.com/drive/u/0/fold… Follow kelvinlina𖤍💜✨ for more Re-share to also help a friend

200+books on info sec  and cybersecurity. Feel free to download any and read.  
LINK:  drive.google.com/drive/u/0/fold…

Follow <a href="/cybergirl_io/">kelvinlina𖤍💜✨</a> for more
Re-share to also help a friend
Miguel Ángel Durán (@midudev) 's Twitter Profile Photo

AWS ha puesto gratis por tiempo limitado todo el material en Español para los Certificados de Cloud e IA. Exámenes oficiales, planes de formación y más. ¡Disponible hasta el 5 de enero! → skillbuilder.aws/category/exam-…

AWS ha puesto gratis por tiempo limitado todo el material en Español para los Certificados de Cloud e IA.

Exámenes oficiales, planes de formación y más.

¡Disponible hasta el 5 de enero!
→ skillbuilder.aws/category/exam-…
EduMock.ron🧪 (@itsedumock) 's Twitter Profile Photo

At least 3 spots have been hit. Fuerte Tiuna, La Carlota airbase and A communications center in El Hatillo. All of these controlled by government, heavily guarded by military and strategic places for Maduro. This is Caracas, Venezuela right now.

NullSecX (@nullsecurityx) 's Twitter Profile Photo

File upload vulnerability — Content-Disposition: filename is processed without validation, allowing RCE. #BugBounty #RCE #CyberSecurity

File upload vulnerability — Content-Disposition: filename is processed without validation, allowing RCE.

#BugBounty #RCE #CyberSecurity