Shay (@shay_1337) 's Twitter Profile
Shay

@shay_1337

Penetration Tester, Web Application Security

ID: 1363755115400855554

calendar_today22-02-2021 07:39:05

570 Tweet

123 Followers

470 Following

Jakub Domeracki (@j_domeracki) 's Twitter Profile Photo

Sharing a technical writeup, which goes over an almost year long responsible disclosure process: jdomeracki.github.io/2024/11/09/ske… The severity of disclosed shortcomings, resulted in googlecloudcheatsheet.withgoogle.com getting decommissioned 🚧 Greatly appreciate the cooperation with Google VRP (Google Bug Hunters)! 🎉

Project Sekai CTF (@projectsekaictf) 's Twitter Profile Photo

🎁Monthly Giveaway🎁 Hack The Box 1-year VIP+ & 3-month Prolab - Follow, Like, and Retweet to join! - Winners will be picked randomly on 11 Feb. #hackthebox #giveaway #projectsekaictf

🎁Monthly Giveaway🎁

Hack The Box 1-year VIP+ & 3-month Prolab
- Follow, Like, and Retweet to join!
- Winners will be picked randomly on 11 Feb.

#hackthebox #giveaway #projectsekaictf
Linus Ekenstam – eu/acc (@linusekenstam) 's Twitter Profile Photo

02 releases "AI Granny" to hijack your scam calls and frustrate the scammers into agony. This should be a service that ALL major service providers should offer for free. Out of simple curtesy.

Doyensec (@doyensec) 's Twitter Profile Photo

🎉 PESD v2.0 - now in the BApp Store ! Effortlessly generate dynamic sequence diagrams directly from #BurpSuite traffic! Now you can also create your own theme, conveniently edit generated diagrams with MD syntax and much more! Install it today! 🎉 #doyensec #appsec #security

Brian Almond (@bripwn) 's Twitter Profile Photo

Oh, and I forgot to give a shout-out to Dirk-jan. KrbrelayX is a really cool tool. If you haven’t played with Kerberos Relaying, give it a shot. github.com/dirkjanm/krbre… I’m showcasing it in this week’s video: youtu.be/Jzm2vzhEANM

SinSinology (@sinsinology) 's Twitter Profile Photo

🔥💀My Advanced .NET Exploitation training is now open for register! bit.ly/4hwNFyM 32-hours of intense .NET exploitation (PoC||GTFO) We'll be exploiting 15+ remote code execution chains (25 bugs in total) 🪲 I’d truly appreciate your support, your RT would mean a lot!🙏

🔥💀My Advanced .NET Exploitation training is now open for register! bit.ly/4hwNFyM
32-hours of intense .NET exploitation (PoC||GTFO)
We'll be exploiting 15+ remote code execution chains (25 bugs in total) 🪲
I’d truly appreciate your support, your RT would mean a lot!🙏
Yossi Sassi (@yossi_sassi) 's Twitter Profile Photo

Are you aware that any local admin on IIS boxes can see appPool identity creds in clear-text? Here's a script to map IIS Servers, appPools, vDirs, usernames & passwords, inc. insights on risk reduction and mitigation of this potential exposure: github.com/YossiSassi/Get… HackCon Norway

Jenish Sojitra (@_jensec) 's Twitter Profile Photo

Publishing new free tool for bug bounty hunters and IT teams 🎉 crxplorer.com We've built a tool that takes a Chrome Web Store URL as input, fetches the code and manifest file, checks permissions, and reviews them via LLM. Using this, I've found numerous issues in

Publishing new free tool for bug bounty hunters and IT teams 🎉

crxplorer.com

We've built a tool that takes a Chrome Web Store URL as input, fetches the code and manifest file, checks permissions, and reviews them via LLM.

Using this, I've found numerous issues in
Burp Suite (@burp_suite) 's Twitter Profile Photo

Introducing the Bambda Library! Join us on the PortSwigger Discord on March 4 at 11am ET (4pm GMT) for an exclusive walkthrough... 💾 Save and re-use your favorite Bambdas 🚀 Get started quicker with built in templates 📂 Keep Bambdas organized Register 👉

Introducing the Bambda Library!

Join us on the PortSwigger Discord on March 4 at 11am ET (4pm GMT) for an exclusive walkthrough...

💾 Save and re-use your favorite Bambdas

🚀 Get started quicker with built in templates

📂 Keep Bambdas organized

Register 👉
ProjectDiscovery (@pdiscoveryio) 's Twitter Profile Photo

Need to create a custom wordlist? Try using katana to crawl target URLs and then tr '[:punct:]' '\n' | sort -u to extract your wordlist!  Bonus tip: Use the -d <num> option to increase the maximum depth to crawl a.k.a MORE WORDS!

Burp Suite (@burp_suite) 's Twitter Profile Photo

Don't miss this brand new AI extension in the BApp store! ✨ MCP Server allows you to: ✅ Connect Burp Suite to AI clients ✅ Easily integrate with Claude Desktop MCP Server also comes with a packaged Stdio MCP proxy server. Check it out 👇

Kennan Davison (@kennandavison) 's Twitter Profile Photo

Introducing Icon, the world’s first AI CMO (Chief Marketing Officer): it can plan, create, & run 1000s of winning ads end-to-end. We're backed by Peter Thiel's Founders Fund & execs of frontier AI labs like OpenAI (ChatGPT), Cognition, & Pika. How it works: 1. Connect Icon to

Louis Nyffenegger (@snyff) 's Twitter Profile Photo

One of the hardest parts of a security code review? Figuring out how the project is structured. deepwiki.com just changed the game: 🧠 Repo overview 🧩 Component relationships 🧭 Architecture map 💬 Ask: “Any secrets?” “SQLi here?” Try it. It's 🔥 for AppSec.

KNOXSS (@kn0x55) 's Twitter Profile Photo

*** KNOXSS GIVEAWAY June 2025 *** Directions: 1. Like 2. Share 3. Be a follower Prize: KNOXSS Pro for 1 Month Results: June 10th Number of Winners: 3 Good luck! 😀 knoxss.pro - #XSS for pros. #BugBounty #PenTesting

Shay (@shay_1337) 's Twitter Profile Photo

Suraj Matan Berson Heard the feedback: "The probability is so low—a user has to drag, drop, and click!?" But with AI agents soon browsing and acting for us (e.g., OpenAI operator), this becomes a 0-click XSS. Critical Thinking - Bug Bounty Podcast

Dirk-jan (@_dirkjan) 's Twitter Profile Photo

I've been researching the Microsoft cloud for almost 7 years now. A few months ago that research resulted in the most impactful vulnerability I will probably ever find: a token validation flaw allowing me to get Global Admin in any Entra ID tenant. Blog: dirkjanm.io/obtaining-glob…