Achul NDgeng (@achulndgeng) 's Twitter Profile
Achul NDgeng

@achulndgeng

use your hearth + your brain, then do your best 😉 .

ID: 859769783897645057

calendar_today03-05-2017 14:01:05

256 Tweet

124 Takipçi

1,1K Takip Edilen

khaled yassen (@khaledyasse1882) 's Twitter Profile Photo

Hello everyone, I'd like to share my new article about several XSS, which I found in multiple bug bounty programs using unknown techniques. I hope this article is useful to you❤️. #cybersecurity #BugBounty #bugbountytips #Pentesting #infosec infosecwriteups.com/how-i-found-mu…

Clint Gibler (@clintgibler) 's Twitter Profile Photo

🤑 We Hacked Google A.I. for $50,000 By Lupin, Joseph Thacker, Justin Gardner 🔹 IDOR in Bard that allowed unauthorized access to other users' images 🔹 GraphQL DoS in Google Cloud 🔹 Exfiltrating Google Workspace info via prompt #bugbounty #bugbountytips landh.tech/blog/20240304-…

🤑 We Hacked Google A.I. for $50,000

By <a href="/0xLupin/">Lupin</a>, <a href="/rez0__/">Joseph Thacker</a>, <a href="/Rhynorater/">Justin Gardner</a>

🔹 IDOR in Bard that allowed unauthorized access to other users' images

🔹 GraphQL DoS in Google Cloud

🔹 Exfiltrating Google Workspace info via prompt

#bugbounty #bugbountytips

landh.tech/blog/20240304-…
Dark Web Intelligence (@dailydarkweb) 's Twitter Profile Photo

CATSploit🐈 CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester. github.com/catsploit/cats… #cybersecurity #infosec #pentest

CATSploit🐈

CATSploit is an automated penetration testing tool using Cyber Attack Techniques Scoring (CATS) method that can be used without pentester.

github.com/catsploit/cats…

#cybersecurity #infosec #pentest
HADESS (@hadess_security) 's Twitter Profile Photo

Unlocking Android Vulnerabilities: A Deep Dive into Security Flaws and Solutions 🛡️💻 blog.devsecopsguides.com/attacking-andr… Attacking IOS: x.com/Hadess_securit… #AndroidSecurity #android #securecoding #appsec #mobilesecurity #DevSecOps

Unlocking Android Vulnerabilities: A Deep Dive into Security Flaws and Solutions 🛡️💻
blog.devsecopsguides.com/attacking-andr…

Attacking IOS: x.com/Hadess_securit…

#AndroidSecurity #android #securecoding #appsec #mobilesecurity #DevSecOps
Sick.Codes (@sickcodes) 's Twitter Profile Photo

Updated Docker-OSX this weekend to include Sonoma. You can now perform security research on macOS, on Linux & WSL; High-Sierra, Mojave, Catalina, Big-Sur, Ventura, and now Sonoma. Thanks Dhiru Kholia & Nicholas Sherlock for the upstream adjustments! --> 35,000 stars, 640,000

Edward Snowden (@snowden) 's Twitter Profile Photo

The NSA is just 𝗗𝗔𝗬𝗦 from taking over the internet, and it's not on the front page of any newspaper--because no one has noticed.

RootMoksha Labs (@rootmoksha) 's Twitter Profile Photo

XSS Bypass Trick onerror=" 𐂃='',𐃨=!𐂃+𐂃,𐂝=!𐃨+𐂃,𐃌=𐂃+{},𐁉=𐃨[𐂃++],𐃵=𐃨[𐂓=𐂃],𐀜=++𐂓+𐂃,𐂠=𐃌[𐂓+𐀜],𐃨[𐂠+=𐃌[𐂃]+(𐃨.𐂝+𐃌)[𐂃]+𐂝[𐀜]+𐁉+𐃵+𐃨[𐂓]+𐂠+𐁉+𐃌[𐂃]+𐃵][𐂠](𐂝[𐂃]+𐂝[𐂓]+𐃨[𐀜]+𐃵+𐁉+'(𐂃)')()" Resource:aem1k.com/aurebesh.js/ #BugBounty #bugbountytips

Santiago (@svpino) 's Twitter Profile Photo

The first open-source implementation of the paper that will change automatic test generation is now available! In February, Meta published a paper introducing a tool to automatically increase test coverage, guaranteeing improvements over an existing code base. This is a big

قيس (@afcq1954) 's Twitter Profile Photo

مشهد يجب ان يشاهده كل العالم وسيحذفه تويتر خلال لحظات جنود الاحتلال يلقون جثامين الشبان الذين ارتقوا من سطح المنزل المحاصر في بلدة قباطية جنوب جنين

Kim Dotcom (@kimdotcom) 's Twitter Profile Photo

There is one weapon the Zionists possess that is more powerful than the media, the blackmail data, the bribery or central banking. With Blackrock, Vanguard and State Street they control a death switch for every economy. They have the power to destroy the markets of individual

Ashutosh Barot (@ashu_barot) 's Twitter Profile Photo

Story Time: How I hacked back a crypto scammer! Yesterday an NFT collector reached out to me showing interest in buying my NFTs. He/she messed up right there, no one would want to buy it! He had a good profile, even had his OpenSea in bio #Crypto #NFTs #CyberSecurity 1/n

Story Time: How I hacked back a crypto scammer! 

Yesterday an NFT collector reached out to me showing interest in buying my NFTs. He/she messed up right there, no one would want to buy it!

He had a good profile, even had his <a href="/opensea/">OpenSea</a> in bio

#Crypto #NFTs #CyberSecurity 

1/n
Trendi𝕏 (@trendix0) 's Twitter Profile Photo

People think learning AI is hard. It’s not. I found 14 free guides so you don’t have to: 1. How to AI - how-to-ai.guide Perfect for non-technical people to master AI. 2. OpenAI Academy - academy.openai.com The official academy of ChatGPT & OpenAI. 3. Coursera -

People think learning AI is hard. It’s not.

I found 14 free guides so you don’t have to:

1. How to AI - how-to-ai.guide
Perfect for non-technical people to master AI.

2. OpenAI Academy - academy.openai.com
The official academy of ChatGPT &amp; OpenAI.

3. Coursera -
ghostlulz (@ghostlulz1337) 's Twitter Profile Photo

🚨AI Agents for API Hacking 🚨 I’ve been developing an AI agent that automates API pentesting. Parses swagger, crafts the perfect payload, analyzes the response, and adapts mid run. Already popping XXE , IDOR, and much more that traditional scanners missed. Sneak peek CLI

🚨AI Agents for API Hacking 🚨

I’ve been developing an AI agent that automates API pentesting. Parses swagger, crafts the perfect payload, analyzes the response, and adapts mid run. 

Already popping XXE , IDOR, and much more that traditional scanners missed. 

Sneak peek CLI
I am Jakoby (@i_am_jakoby) 's Twitter Profile Photo

Well it appears APTs are learning from me in real time. This looks familiar doesn't it? thehackernews.com/2025/06/new-ma… Using cloudflare tunnels and malicious LNK files lol Right after I demo'd exactly that with my 3 parts series I did as a collaboration with Nahamsec ha You can

Well it appears APTs are learning from me in real time. This looks familiar doesn't it? 

thehackernews.com/2025/06/new-ma…

Using cloudflare tunnels and malicious LNK files lol 

Right after I demo'd exactly that with my 3 parts series I did as a collaboration with Nahamsec ha 

You can
Qwen (@alibaba_qwen) 's Twitter Profile Photo

>>> Qwen3-Coder is here! ✅ We’re releasing Qwen3-Coder-480B-A35B-Instruct, our most powerful open agentic code model to date. This 480B-parameter Mixture-of-Experts model (35B active) natively supports 256K context and scales to 1M context with extrapolation. It achieves

&gt;&gt;&gt; Qwen3-Coder is here! ✅

We’re releasing Qwen3-Coder-480B-A35B-Instruct, our most powerful open agentic code model to date. This 480B-parameter Mixture-of-Experts model (35B active) natively supports 256K context and scales to 1M context with extrapolation. It achieves
Amjad Masad (@amasad) 's Twitter Profile Photo

When I first spoke out about the genocide, I was one of the few voices in tech, and it came at a cost. I faced sabotage especially from the VC class: lies, leaks, threats, and blocked investments. It was painful, but I never once regretted standing up for the children in Gaza.