poprbx (@pop_rbx) 's Twitter Profile
poprbx

@pop_rbx

ID: 1371420806115381251

calendar_today15-03-2021 11:19:47

15 Tweet

14 Followers

560 Following

Paul L. (@am0nsec) 's Twitter Profile Photo

This book has been published in 2005 and is still one of the best references out there in terms of computer virology. Developing advanced malware and viruses will always be an art.

This book has been published in 2005 and is still one of the best references out there in terms of computer virology.

Developing advanced malware and viruses will always be an art.
B:\a.zza (@mcbazza) 's Twitter Profile Photo

Red-Teamers: [lazy]People like me use Notepad++ as a note-taking thing. We create a 'new', then never get around to saving them. They get cached here: C:\Users\{username}\AppData\Roaming\Notepad++\backup If you hit a dev/sysadmin, you'll find all kinds of crazy stuff.

Red-Teamers:

[lazy]People like me use Notepad++ as a note-taking thing. We create a 'new', then never get around to saving them.

They get cached here:
C:\Users\{username}\AppData\Roaming\Notepad++\backup

If you hit a dev/sysadmin, you'll find all kinds of crazy stuff.
randy@infosec.exchange (@rpargman) 's Twitter Profile Photo

Blue team tool drop: #log4j internal honeypot for active defense. Alerts you by sending a message to your Slack, Teams, or Mattermost channel if it receives a GET or POST with suspicious ${ in headers or form fields. Use to detect scanning from the inside: github.com/BinaryDefense/…

Mahmoud Youssef (@0xmahmoudjo0) 's Twitter Profile Photo

If you collected a bunch of alive IP addresses. Don't run Nuclei by ProjectDiscovery directly on it, Firstly make a Full port scanning then run it, maybe you find some juice stuff on other ports like what I got XD !! The command: carbon.now.sh/?bg=rgba%28171… #bugbountytips #BugBounty #CyberSecurity

If you collected a bunch of alive IP addresses. Don't run <a href="/pdnuclei/">Nuclei by ProjectDiscovery</a> directly on it, Firstly make a Full port scanning then run it, maybe you find some juice stuff on other ports like what I got XD !!

The command: carbon.now.sh/?bg=rgba%28171…

#bugbountytips #BugBounty #CyberSecurity
𝐑𝐀𝐢𝐡𝐚𝐧 ✪ (@zapstiko) 's Twitter Profile Photo

Firstly make a Full port scanning then run it Nuclei by ProjectDiscovery Mahmoud Youssef command: rustscan -a 'hosts.txt' -r 1-65535 | grep Open | tee open_ports.txt | sed 's/Open //' | httpx -silent | nuclei -t ~/nuclei-templates/ #bugbountytips #BugBounty #CyberSecurity

Firstly make a Full port scanning then run it <a href="/pdnuclei/">Nuclei by ProjectDiscovery</a>
<a href="/0xmahmoudJo0/">Mahmoud Youssef</a>
command: 
rustscan -a 'hosts.txt' -r 1-65535 | grep Open | tee open_ports.txt | sed 's/Open //' | httpx -silent | nuclei -t ~/nuclei-templates/

#bugbountytips #BugBounty #CyberSecurity
ippsec (@ippsec) 's Twitter Profile Photo

Ever come across a file running on a Linux box that was deleted from the disk? Did you know you can likely use DD to recover the file without any non-standard tools?

Ever come across a file running on a Linux box that was deleted from the disk? Did you know you can likely use DD to recover the file without any non-standard tools?
Patrik Fehrenbach (@itsecurityguard) 's Twitter Profile Photo

This is your yearly reminder that ALL Udemy Bug Bounty courses are a waste of money. The content you need is out there, completely for free. Don't believe me? Here is a list of the best Bug Bounty Ressources out there 🧵👇 #bugbountytips #BugBounty

0xor0ne (@0xor0ne) 's Twitter Profile Photo

Cool and useful interactive map of the Linux kernel Map: makelinux.github.io/kernel/map/ Source repo: github.com/makelinux/linu… #Linux #kernel #hacking #programming #informationtechnology #kernelinternals

Cool and useful interactive map of the Linux kernel

Map: makelinux.github.io/kernel/map/  
Source repo: github.com/makelinux/linu… 

#Linux #kernel #hacking #programming #informationtechnology #kernelinternals
Petar Jr. Pranic (@ipslav) 's Twitter Profile Photo

My first research and tool are finally out. If you want to deep dive into some CLR internals and understand how we can abuse it to blend-in within its own logic go check it out. Hope you'll enjoy the read. ipslav.github.io/2023-12-12-let…