PriorityAttack (@priorityattack) 's Twitter Profile
PriorityAttack

@priorityattack

Automatically test your web applications as soon as new vulnerabilities are discovered

ID: 1533822939115683840

linkhttps://priorityattack.com calendar_today06-06-2022 14:47:56

20 Tweet

13 Followers

55 Following

GreyNoise (@greynoiseio) 's Twitter Profile Photo

Over the weekend, we went from seeing 0 successful attempts of CVE-2022-26134 to 727 as of this morning. View here: viz.greynoise.io/tag/atlassian-…

Over the weekend, we went from seeing 0 successful attempts of CVE-2022-26134 to 727 as of this morning. View here: viz.greynoise.io/tag/atlassian-…
PriorityAttack (@priorityattack) 's Twitter Profile Photo

Quick POC of CVE-2022-26134 github.com/vulhub/vulhub/…. Let us know if you need help scanning for this issue as well as 1000s more. bxw78l1a75q.typeform.com/to/bVRESfPa

Dutch Institute for Vulnerability Disclosure (@divdnl) 's Twitter Profile Photo

We waren een klein beetje druk dit weekend... Wat we allemaal hebben gedaan? Te veel voor een tweet... dus check onze website divd.nl/2022/06/06/Con…

We waren een klein beetje druk dit weekend... Wat we allemaal hebben gedaan? Te veel voor een tweet... dus check onze website divd.nl/2022/06/06/Con…
Ayoub FATHI 阿尤布 (@_ayoubfathi_) 's Twitter Profile Photo

A customer turned Hacker! We've asked a customer on our website to register an account on HackerOne, invited him to our Program, paid his first bounty, and turned him into a Hacker :) This one is probably one of the best interactions we've had with a user on our website :)

A customer turned Hacker!

We've asked a customer on our website to register an account on HackerOne, invited him to our Program, paid his first bounty, and turned him into a Hacker :)

This one is probably one of the best interactions we've had with a user on our website :)
PriorityAttack (@priorityattack) 's Twitter Profile Photo

Find out how we can reduce your vulnerability response time from several days to just a few minutes. Now covering all CVEs since 2010. priorityattack.com

Petko D. Petkov (@pdp) 's Twitter Profile Photo

Would you consider using a cloud-based attack proxy service? Imagine a SaaS platform that records all your web pentesting sessions, has instance search, can run your fuzzing and other types of jobs, integrates into slack for notifications, etc.

Petko D. Petkov (@pdp) 's Twitter Profile Photo

Is anyone using Google Colab as a runbook platform for incident management and other standard security operations tasks? What's your take?

BountyPage (@bountypagehq) 's Twitter Profile Photo

Here is a preview of our gorgeous Bug Bounty and Responsible Vulnerability Disclosure management platform. Expect new exciting features and announcements soon.

Here is a preview of our gorgeous Bug Bounty and Responsible Vulnerability Disclosure management platform. Expect new exciting features and announcements soon.
BountyPage (@bountypagehq) 's Twitter Profile Photo

We have now launched BountyPage on ProductHunt and we are offering 100% discount for the first 12 months. Check it out producthunt.com/posts/bountypa…