ameer begum (@rickytool) 's Twitter Profile
ameer begum

@rickytool

ID: 1777286508631760896

calendar_today08-04-2024 10:45:59

46 Tweet

4 Followers

302 Following

Kirill Firsov (@k_firsov) 's Twitter Profile Photo

How to bypass Cloudflare WAF? FearsOff Cybersecurity #bugbountytips #cloudflare #waf #bypass 1. Found an SQL injection but getting blocked by Cloudflare? Here's a pro tip ๐Ÿ˜

How to bypass Cloudflare WAF?
<a href="/FearsOff/">FearsOff Cybersecurity</a> #bugbountytips #cloudflare #waf #bypass

1. Found an SQL injection but getting blocked by Cloudflare?
Here's a pro tip ๐Ÿ˜
Dark Web Informer - Cyber Threat Intelligence (@darkwebinformer) 's Twitter Profile Photo

RecoverPy: Find and recover deleted or even overwritten files from your Linux partitions, quickly and easily. GitHub: github.com/PabloLec/Recovโ€ฆ

Djalil Ayed (@djalilayed) 's Twitter Profile Photo

๐Ÿ˜ธ New room Introduction to EDR from ๐Ÿ• Learn the fundamentals of EDR and explore its features and working. ๐Ÿ”ฅ What is an EDR? ๐Ÿง Beyond the Antivirus โšก How an EDR works? โ˜• EDR Telemetry ๐Ÿค– Detection And Response Capabilities ๐Ÿฆˆ Investigate an alert on EDR

๐Ÿ˜ธ New room Introduction to EDR from <a href="/tryhackme/"></a> 

๐Ÿ• Learn the fundamentals of EDR and explore its features and working.

๐Ÿ”ฅ What is an EDR?
๐Ÿง Beyond the Antivirus
โšก How an EDR works?
โ˜• EDR Telemetry
๐Ÿค– Detection And Response Capabilities
๐Ÿฆˆ Investigate an alert on EDR
Shawn Ryan (@shawnryan762) 's Twitter Profile Photo

I will never forget this episodeโ€”it literally broke the internet and remains one of the showโ€™s most viral moments with Ryan Montgomery. To say it made a dent and scared predators would be a massive understatement. Ryan M. Montgomery

Kirill Firsov (@k_firsov) 's Twitter Profile Photo

How to access servers behind Cloudflare by bypassing the firewall? FearsOff Cybersecurity #bugbountytips #cloudflare #firewall #bypass 1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.

How to access servers behind Cloudflare by bypassing the firewall?
<a href="/FearsOff/">FearsOff Cybersecurity</a> #bugbountytips #cloudflare #firewall #bypass

1) Found a sweet hostname but Cloudflare Firewall blocks you? There's a neat trick attackers can use if the origin is misconfigured.
Mr.Un1k0d3r (@mrun1k0d3r) 's Twitter Profile Photo

You want to load your shellcode in .NET without calling VirtualProtect? Use RuntimeHelpers.PrepareMethod to create a predictable RWX memory region for you. This method also doesn't require a delegate function pointer, since you override a .NET method. github.com/Mr-Un1k0d3r/Doโ€ฆ

YungBinary (@yungbinary) 's Twitter Profile Photo

Malware sandbox bypass and Windows Defender exclusion PoC! I made it after discovering a simple yet effective technique being used by a loader in the wild dropping what we are calling #NightshadeC2 (blog coming soon!) PoC -> github.com/eSentire/iocs/โ€ฆ youtube.com/watch?v=_0-IMMโ€ฆ

Harshleen Chawla (@harshleenchawl2) 's Twitter Profile Photo

๐Ÿ“๐—–๐—˜๐—ง๐—ฃ: ๐—œ๐—ป๐—ฐ๐—น๐˜‚๐—ฑ๐—ฒ๐˜€ ๐—ฝ๐—ฎ๐˜†๐—น๐—ผ๐—ฎ๐—ฑ๐˜€, ๐—ฑ๐—ฟ๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€, ๐—ฎ๐—ป๐—ฑ ๐—ฏ๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€. ๐——๐—ฒ๐˜€๐—ถ๐—ด๐—ป๐—ฒ๐—ฑ ๐—ณ๐—ผ๐—ฟ ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—ฎ๐—บ ๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น๐˜€ ๐˜„๐—ผ๐—ฟ๐—ธ๐—ถ๐—ป๐—ด ๐˜„๐—ถ๐˜๐—ต ๐—ช๐—ถ๐—ป๐——๐—ฏ๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฎ๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ฑ๐—ฒ๐—ฏ๐˜‚๐—ด๐—ด๐—ถ๐—ป๐—ด ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€.

๐Ÿ“๐—–๐—˜๐—ง๐—ฃ: ๐—œ๐—ป๐—ฐ๐—น๐˜‚๐—ฑ๐—ฒ๐˜€ ๐—ฝ๐—ฎ๐˜†๐—น๐—ผ๐—ฎ๐—ฑ๐˜€, ๐—ฑ๐—ฟ๐—ถ๐˜ƒ๐—ฒ๐—ฟ๐˜€, ๐—ฎ๐—ป๐—ฑ ๐—ฏ๐˜†๐—ฝ๐—ฎ๐˜€๐˜€ ๐˜๐—ฒ๐—ฐ๐—ต๐—ป๐—ถ๐—พ๐˜‚๐—ฒ๐˜€.
๐——๐—ฒ๐˜€๐—ถ๐—ด๐—ป๐—ฒ๐—ฑ ๐—ณ๐—ผ๐—ฟ ๐—ฟ๐—ฒ๐—ฑ ๐˜๐—ฒ๐—ฎ๐—บ ๐—ฝ๐—ฟ๐—ผ๐—ณ๐—ฒ๐˜€๐˜€๐—ถ๐—ผ๐—ป๐—ฎ๐—น๐˜€ ๐˜„๐—ผ๐—ฟ๐—ธ๐—ถ๐—ป๐—ด ๐˜„๐—ถ๐˜๐—ต ๐—ช๐—ถ๐—ป๐——๐—ฏ๐—ด ๐—ฎ๐—ป๐—ฑ ๐—ฎ๐—ฑ๐˜ƒ๐—ฎ๐—ป๐—ฐ๐—ฒ๐—ฑ ๐—ฑ๐—ฒ๐—ฏ๐˜‚๐—ด๐—ด๐—ถ๐—ป๐—ด ๐—ฒ๐—ป๐˜ƒ๐—ถ๐—ฟ๐—ผ๐—ป๐—บ๐—ฒ๐—ป๐˜๐˜€.
0b1d1 (@_0b1d1) 's Twitter Profile Photo

Navigate the Network: Mastering Wireshark Filters ๐Ÿฆˆ๐Ÿ” Drowning in network data? Learn how to use Wireshark filters to find exactly what you're looking for! Filters are a powerful tool for navigating vast amounts of packet data,

Navigate the Network: Mastering Wireshark Filters ๐Ÿฆˆ๐Ÿ”

Drowning in network data? Learn how to use Wireshark filters to find exactly what you're looking for! Filters are a powerful tool for navigating vast amounts of packet data,
NullSecX (@nullsecurityx) 's Twitter Profile Photo

New Video: ๐ŸšจJust explored a JWT auth bypass via flawed signature verification! A tiny misconfiguration (alg: none) can let an altered token bypass checks โ€” admin access in a lab environment. ๐Ÿ’ก Watch the full walkthrough: youtube.com/watch?v=jrix7Fโ€ฆ #JWT #BugBounty #burpsuite

TryHackMe (@realtryhackme) 's Twitter Profile Photo

Have you ever wondered if you need a degree to start a career in cyber security? Over 50% of professionals in cyber donโ€™t have a CS degree; they have skills. Hands-on experience, problem-solving, and proof of ability outweigh theory every time. โœ… Read the full blog to see

Have you ever wondered if you need a degree to start a career in cyber security?

Over 50% of professionals in cyber donโ€™t have a CS degree; they have skills. Hands-on experience, problem-solving, and proof of ability outweigh theory every time.  โœ… 

Read the full blog to see
Jenish Sojitra (@_jensec) 's Twitter Profile Photo

I usually brute-force API paths with "Debug":true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.

I usually brute-force API paths with "Debug":true parameter and often it leads to reveal internal debug info to reverse proxies exposing API secrets and tokens.
Alp (@alp0x01) 's Twitter Profile Photo

Cloudflare has started blocking proxy tools like Burp Suite. If you encounter this error, download the โ€œBypass Bot Detectionโ€ extension from the BApp Store in Burp Suite. It should resolve the issue for Burp Suite.

Cloudflare has started blocking proxy tools like Burp Suite. If you encounter this error, download the โ€œBypass Bot Detectionโ€ extension from the BApp Store in Burp Suite. It should resolve the issue for Burp Suite.
Het Mehta (@hetmehtaa) 's Twitter Profile Photo

Cloudflare has recently started blocking proxy tools like Burp Suite by identifying their unique TLS and request fingerprints. If you encounter this issue, install the โ€œBypass Bot Detectionโ€ extension from the BApp Store. This extension spoofs Burpโ€™s TLS fingerprint, making it

Cloudflare has recently started blocking proxy tools like Burp Suite by identifying their unique TLS and request fingerprints.

If you encounter this issue, install the โ€œBypass Bot Detectionโ€ extension from the BApp Store. This extension spoofs Burpโ€™s TLS fingerprint, making it
ำ‰ัฆะกา ั–ะ˜ิŒ าฌะ„ัฆำ (@hackingteam777) 's Twitter Profile Photo

New Video: How does Blind SQL Injection still work in modern applications? No errors. No query output. Just conditional responsesโ€ฆ and an admin account takeover. Blind SQLi exploitation via cookies โ€” step by step. ๐ŸŽฅ Watch here: youtu.be/oM9hWU78dqE #BugBounty